.. / CVE-2021-24915

Exploit for Contest Gallery < 13.1.0.6 - SQL injection (CVE-2021-24915)

Description:

The plugin does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address.

Nuclei Template

View the template here CVE-2021-24915.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-24915.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2021-24915
https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917
https://wordpress.org/plugins/contest-gallery/
https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac