Blind XPath Injection
-
Running Qualys WAS scan report will generate an “High Security Risk” on the
/wp-admin/admin-ajax.php endpoint with a parameter “aslp” which is this plug-in. The report is:
“It has been detected by exploiting the parameter aslp
The payloads section will display a list of tests that show how the param could have been exploited to collect the information. This vulnerability was identified using the difference in responses for TRUE and FALSE payloads. This vulnerability is confirmed based on the difference in the response content (detected using fuzzy match).
Content of all TRUE responses differ from FALSE responses (detected using fuzzy match).”The full POST parameters are (as true):
action=ajaxsearchlite_search&aslp=%20or%20true()%20or%20%27and%27%20%3D%20%27and%27%20&asid=2&options=qtranslate_lang%3D0%26set_intitle%3DNone %26set_incontent%3DNone%26set_inexcerpt%3DNone%26set_inposts%3DNone%26set_inpages%3DNone%26customset%255B%255D%3Dproducten%26categoryset%255B%255D %3D19%26categoryset%255B%255D%3D18%26categoryset%255B%255D%3D5%26categoryset%255B%255D%3D23%26categoryset%255B%255D%3D16%26categoryset%255B%255D %3D14%26categoryset%255B%255D%3D17%26categoryset%255B%255D%3D1%26categoryset%255B%255D%3D15%26categoryset%255B%255D%3D20
and (as false):
action=ajaxsearchlite_search&aslp=%20and%20false()%20and%20%27or%27%20%3D%20%27and%27%20&asid=2&options=qtranslate_lang%3D0%26set_intitle%3DNone%26set_incontent%3DNone %26set_inexcerpt%3DNone%26set_inposts%3DNone%26set_inpages%3DNone%26customset%255B%255D%3Dproducten%26categoryset%255B%255D%3D19%26categoryset%255B%255D %3D18%26categoryset%255B%255D%3D5%26categoryset%255B%255D%3D23%26categoryset%255B%255D%3D16%26categoryset%255B%255D%3D14%26categoryset%255B%255D %3D17%26categoryset%255B%255D%3D1%26categoryset%255B%255D%3D15%26categoryset%255B%255D%3D20Anyone has any ideas? WP version is 5.3, plug-in versions is 4.8
The page I need help with: [log in to see the link]
- The topic ‘Blind XPath Injection’ is closed to new replies.