cve/2023/CVE-2023-5203.md

19 lines
956 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-5203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5203)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.0.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The WP Sessions Time Monitoring Full Automatic WordPress plugin before 1.0.9 does not sanitize the request URL or query parameters before using them in an SQL query, allowing unauthenticated attackers to extract sensitive data from the database via blind time based SQL injection techniques, or in some cases an error/union based technique.
### POC
#### Reference
- https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932
#### Github
- https://github.com/20142995/sectool
- https://github.com/tanjiti/sec_profile