cve/2022/CVE-2022-0760.md

20 lines
924 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0760)
![](https://img.shields.io/static/v1?label=Product&message=Simple%20Link%20Directory&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.7.2%3C%207.7.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The Simple Link Directory WordPress plugin before 7.7.2 does not validate and escape the post_id parameter before using it in a SQL statement via the qcopd_upvote_action AJAX action (available to unauthenticated and authenticated users), leading to an unauthenticated SQL Injection
### POC
#### Reference
- https://wpscan.com/vulnerability/1c83ed73-ef02-45c0-a9ab-68a3468d2210
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/cyllective/CVEs