It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/152171fc-888c-4275-a118-5a1e664ef28b | Third Party Advisory |
https://www.wordfence.com/blog/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/152171fc-888c-4275-a118-5a1e664ef28b | Third Party Advisory |
https://www.wordfence.com/blog/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/152171fc-888c-4275-a118-5a1e664ef28b - Third Party Advisory | |
References | () https://www.wordfence.com/blog/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/ - Exploit, Third Party Advisory |
Information
Published : 2021-05-17 17:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24295
Mitre link : CVE-2021-24295
CVE.ORG link : CVE-2021-24295
JSON object : View
Products Affected
cleantalk
- spam_protection\,_antispam\,_firewall
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')