Skip to content

k0ns0l/CVE-2024-10400

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-10400

The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the 'rating_filter' parameter in all versions up to, and including, 2.7.6 [versions <= 2.7.6] due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

For more details, see the NVD Advisory.

Note: The exploit uses a time-based blind SQL injection check with a 5-second delay threshold. If the response time exceeds 5 seconds, the target is confirmed to be vulnerable.

Disclaimer: This information is provided for educational and research purposes only. The author is not responsible for any misuse or damage caused by this information.

Usage

python3 CVE-2024-10400.py -u https://example-site.com/wordpress -user admin -p password123

About

[POC][Exploit] CVE-2024-10400

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages