Files
CVEs-PoC/2021/CVE-2021-24762.md
2025-09-29 21:09:30 +02:00

34 lines
1.6 KiB
Markdown

### [CVE-2021-24762](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24762)
![](https://img.shields.io/static/v1?label=Product&message=Perfect%20Survey&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.5.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brightgreen)
### Description
The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
### POC
#### Reference
- http://packetstormsecurity.com/files/166072/WordPress-Perfect-Survey-1.5.1-SQL-Injection.html
- https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad
#### Github
- https://github.com/0xZEros66/Wordpress-Exploit-AiO-Package
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Enes4xd/Enes4xd
- https://github.com/Hacker5preme/Exploits
- https://github.com/MalekAlthubiany/Uploading-a-Shell-in-WordPress-via-SQLi-Entry-Point
- https://github.com/MalekAlthubiany/WordPressShell-OSCP
- https://github.com/Mr-Tree-S/POC_EXP
- https://github.com/Shamsuzzaman321/Wordpress-Exploit-AiO-Package
- https://github.com/cr0ss2018/cr0ss2018
- https://github.com/ezelnur6327/Enes4xd
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/ezelnur6327/ezelnur6327
- https://github.com/galoget/schneider-electric-ctf
- https://github.com/superlink996/chunqiuyunjingbachang