Lucene search

K
wpexploitPablo SanchezWPEX-ID:5085EC75-0795-4004-955D-E71B3D2C26C6
HistorySep 25, 2023 - 12:00 a.m.

Bookly < 22.4 - Admin+ SQLi

2023-09-2500:00:00
Pablo Sanchez
56
bookly
admin
sql injection
logs
intercept
payloads
columns
created_at
delay
exploit

EPSS

0.001

Percentile

24.2%

Description The plugin does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin

Go to Bookly> Settings > Logs
Do a search and intercept the request
The parameter `columns%5B0%5D%5Bdata%5D` with value `created_at` is vulnerable to payloads like the following `(select*from(select(sleep(10)))a)`
See the delay in the SQL query.

EPSS

0.001

Percentile

24.2%

Related for WPEX-ID:5085EC75-0795-4004-955D-E71B3D2C26C6