Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2114 PoC — WordPress plugin NEX-Forms SQL注入漏洞

Source
Associated Vulnerability
Title:WordPress plugin NEX-Forms SQL注入漏洞 (CVE-2023-2114)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin NEX-Forms 8.4 之前版本存在SQL注入漏洞,该漏洞源于没有清理或转义 table 属性。
Description
Quick Review about the SQL-Injection in the NEX-Forms Plugin for WordPress
Readme
# nex-forms_SQL-Injection CVE-2023-2114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2114

https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d

Quick Review about the SQL-Injection in the NEX-Forms Plugin for WordPress

## Uploaded exploit
Note that this uploaded exploit code isnt for this particular vulnerability... But this is an example how you could make an exploit for this issue.

## Vulnerable Versions
From Version 8.3 (Maybe earlier too) till version 8.4

## The SQL-Injection itself
The SQL-Injection is placed in the authenticated area from NEX-Forms. When you edit a form and want to safe it, your client sends a post-request to the server with some parameters.

One of those parameters is called 'table' which is vulnerable. There was no sanitizing or filtering.

## Screenshots
![request](https://user-images.githubusercontent.com/91736634/230071803-edb449a3-0d99-4574-9858-00444c3b36cc.PNG)
![save-button](https://user-images.githubusercontent.com/91736634/230071810-9b08bd2b-23fa-4625-af21-27d717c95e76.PNG)
![sql_error](https://user-images.githubusercontent.com/91736634/230071811-8bf5be21-4043-4a90-936f-03c5cada5a6c.PNG)
![database](https://user-images.githubusercontent.com/91736634/230071813-2d4ef627-085b-4611-86ff-db1cff665516.PNG)
File Snapshot

[4.0K] /data/pocs/fc881a90ea288c438d37d2d02a962cb350feba60 ├── [4.0K] js_sql_enum │   ├── [3.0K] check_password.html │   └── [5.5K] javascript_sql_enum.html └── [1.3K] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.