Lucene search

K
attackerkbAttackerKBAKB:29D948EE-4FA2-4F62-9C25-3F3C95EE6F3D
HistoryJan 08, 2020 - 12:00 a.m.

CVE-2019-20361

2020-01-0800:00:00
attackerkb.com
12

0.277 Low

EPSS

Percentile

96.8%

There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).

Recent assessments:

h00die at January 20, 2021 1:48am UTC reported:

A blind, time based SQL injection was discovered in Email Subscribers & Newsletters WordPress plugin versions before 4.3.1. The hash parameter is vulnerable to injection. While readily accessible, and a decent amount of installs, the SQLi is relatively complex compared to most commons SQLi for Wordpress Plugins. The request requires a GUID (random is fine), and email (random is fine), and is formatted as such:
{"contact_id":"100','100','100','3'),('1594999398','1594999398','1',(1) AND #{payload},'100','100','3'),('1594999398','1594999398','1','100","campaign_id":"100","message_id":"100","email":"#{email}","guid":"#{guid}","action":"open"}

<https://github.com/rapid7/metasploit-framework/pull/14418&gt;

Assessed Attacker Value: 3
Assessed Attacker Value: 3Assessed Attacker Value: 3

0.277 Low

EPSS

Percentile

96.8%