mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
34 lines
1.6 KiB
Markdown
34 lines
1.6 KiB
Markdown
### [CVE-2021-24762](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24762)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/166072/WordPress-Perfect-Survey-1.5.1-SQL-Injection.html
|
|
- https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad
|
|
|
|
#### Github
|
|
- https://github.com/0xZEros66/Wordpress-Exploit-AiO-Package
|
|
- https://github.com/20142995/nuclei-templates
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/Enes4xd/Enes4xd
|
|
- https://github.com/Hacker5preme/Exploits
|
|
- https://github.com/MalekAlthubiany/Uploading-a-Shell-in-WordPress-via-SQLi-Entry-Point
|
|
- https://github.com/MalekAlthubiany/WordPressShell-OSCP
|
|
- https://github.com/Mr-Tree-S/POC_EXP
|
|
- https://github.com/Shamsuzzaman321/Wordpress-Exploit-AiO-Package
|
|
- https://github.com/cr0ss2018/cr0ss2018
|
|
- https://github.com/ezelnur6327/Enes4xd
|
|
- https://github.com/ezelnur6327/enesamaafkolan
|
|
- https://github.com/ezelnur6327/ezelnur6327
|
|
- https://github.com/galoget/schneider-electric-ctf
|
|
- https://github.com/superlink996/chunqiuyunjingbachang
|
|
|