cve/2021/CVE-2021-24398.md

19 lines
1021 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24398](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24398)
![](https://img.shields.io/static/v1?label=Product&message=RESPONSIVE%203D%20SLIDER&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.2%3C%3D%201.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%20SQL%20Injection&color=brighgreen)
### Description
The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.
### POC
#### Reference
- https://codevigilant.com/disclosure/2021/wp-plugin-morpheus-slider/
- https://wpscan.com/vulnerability/e6fb2256-0214-4891-b4b7-e4371a1599a5
#### Github
No PoCs found on GitHub currently.