Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-24295

Опубликовано: 17 мая 2021
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Средний

Описание

It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:cleantalk:spam_protection\,_antispam\,_firewall:*:*:*:*:*:wordpress:*:*
Версия до 5.153.4 (исключая)

EPSS

Процентиль: 96%
0.26068
Средний

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-89

Связанные уязвимости

github
больше 3 лет назад

It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость функции update_log (lib/Cleantalk/ApbctWP/Firewall/SFW.php) модулей для защиты от спама Spam protection, AntiSpam, FireWall плагина CleanTalk, позволяющая нарушителю выполнить произвольные SQL-запросы

EPSS

Процентиль: 96%
0.26068
Средний

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-89