mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
1.4 KiB
1.4 KiB
CVE-2021-24762
Description
The Perfect Survey WordPress plugin before 1.5.2 does not validate and escape the question_id GET parameter before using it in a SQL statement in the get_question AJAX action, allowing unauthenticated users to perform SQL injection.
POC
Reference
- http://packetstormsecurity.com/files/166072/WordPress-Perfect-Survey-1.5.1-SQL-Injection.html
- https://wpscan.com/vulnerability/c1620905-7c31-4e62-80f5-1d9635be11ad
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Enes4xd/Enes4xd
- https://github.com/Hacker5preme/Exploits
- https://github.com/Mr-Tree-S/POC_EXP
- https://github.com/Shamsuzzaman321/Wordpress-Exploit-AiO-Package
- https://github.com/cr0ss2018/cr0ss2018
- https://github.com/ezelnur6327/Enes4xd
- https://github.com/ezelnur6327/enesamaafkolan
- https://github.com/ezelnur6327/ezelnur6327
- https://github.com/galoget/schneider-electric-ctf
- https://github.com/superlink996/chunqiuyunjingbachang