Files
CVEs-PoC/2017/CVE-2017-14723.md
T
2024-06-18 02:51:15 +02:00

23 lines
979 B
Markdown

### [CVE-2017-14723](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14723)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Before version 4.8.2, WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
### POC
#### Reference
- https://medium.com/websec/wordpress-sqli-poc-f1827c20bf8e
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Afetter618/WordPress-PenTest
- https://github.com/Byebyesky/IT-Security-Projekt
- https://github.com/CeCe2018/Codepath
- https://github.com/CeCe2018/Codepath-Week-7-Alternative-Assignment-Essay
- https://github.com/Tanvi20/Week-7-Alternative-Assignment-wp-cve