CVE-2024-3495 Scanner
CVE-2024-3495 scanner - SQL Injection vulnerability in Wordpress Country State City Dropdown CF7 plugin
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
4 weeks
Scan only one
Domain, IPv4
Toolbox
-
The Country State City Dropdown CF7 plugin is used in WordPress sites to provide a cascading dropdown menu for country, state, and city selection in forms. It is widely utilized by developers and site owners to enhance user experience in form submissions. The plugin is popular for its ease of use and integration with the Contact Form 7 plugin. It is employed in various industries, including e-commerce and service-oriented websites, to streamline address entry. The plugin aims to simplify the input process for users filling out forms.
The SQL Injection vulnerability in the Country State City Dropdown CF7 plugin allows attackers to manipulate SQL queries by exploiting insufficient input escaping and preparation. This can lead to unauthorized access and extraction of sensitive data from the database. The vulnerability affects the 'cnt' and 'sid' parameters in versions up to and including 2.7.2. Exploitation of this vulnerability requires no authentication, making it a critical security risk.
The Country State City Dropdown CF7 plugin has a SQL Injection vulnerability due to inadequate escaping and preparation of user-supplied input. Specifically, the 'cnt' and 'sid' parameters in AJAX requests are vulnerable. Attackers can inject malicious SQL queries via these parameters, leading to the execution of arbitrary SQL commands. The issue is present in the 'tc_csca_get_cities' function in the 'admin-ajax.php' file. This vulnerability can be exploited remotely without authentication, potentially compromising the entire database.
Exploitation of the SQL Injection vulnerability can lead to severe consequences, including unauthorized access to sensitive data, such as user credentials and personal information. Attackers may execute arbitrary SQL commands, leading to data manipulation or deletion. This could result in website defacement, data loss, or unauthorized administrative access. The overall security and integrity of the affected WordPress site could be significantly compromised.
Join S4E to protect your digital assets from critical vulnerabilities like SQL Injection. Our comprehensive Cyber Threat Exposure Management platform offers continuous monitoring and detailed reporting to keep your website secure. Benefit from automated vulnerability scanning, real-time alerts, and expert remediation guidance. Sign up now to safeguard your online presence and prevent potential security breaches.
References:
- https://sploitus.com/exploit?id=EDF4B3F8-DDF4-5196-A375-EC81B8BC18F1&utm_source=rss&utm_medium=rss
- https://github.com/truonghuuphuc/CVE-2024-3495-Poc
- https://nvd.nist.gov/vuln/detail/CVE-2024-3495
- https://plugins.trac.wordpress.org/browser/country-state-city-auto-dropdown/trunk/includes/ajax-actions.php#L22
- https://plugins.trac.wordpress.org/browser/country-state-city-auto-dropdown/trunk/includes/ajax-actions.php#L8