mrnfrancesco / GreedyForSQLi

Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Powered by Semgrep Target Wordpress plugins License LGPL 2.1 only

copertina

Greedy for SQL Injection

Slides and code used to present the research conducted together with @dipa96 in which we implemented custom templates for Semgrep with the purpose of detecting SQL Injection from the analysis of Wordpress plugin source code.

Table of contents

About

This project was presented at the ComeToCode2022 conference. The project was born out of a desire to explore the world of code review and the SemGrep tool.

Watch our presentation at: Slides_ENG

Getting Started

Project requires:

Make sure each requirement is installed correctly before proceeding.

Installing

Run the following command to download the latest version of project.

git clone https://github.com/dipa96/GreedyForSQLi

Setting up your wordpress environment. Check docker-compose.yaml file for details or change settings.

cd GreedyForSQLi
docker-compose up -d

By default you will find wordpress at: http://10.10.10.2/

Usage

Once have WordPress configured you will have plugins installed and already be able to launch your first semgrep scan with our semgrep templates.

cd GreedyForSQLi
cd rules/php/wordpress/plugins
semgrep -c ajax-action-to-sqli.yaml -c ajax-action-to-sqli-deep.yaml ../../../../plugins/wp-visual-slidebox-builder

Achievements

We started reporting vulnerabilities to WPScan. Currently these are the updated CVEs.

Contributing

About

Ricerca che mostra come scrivere regole per SemGrep per cercare SQL Injection nei plugin di Wordpress che usano action AJAX

License:GNU Lesser General Public License v2.1


Languages

Language:PHP 43.9%Language:JavaScript 31.9%Language:CSS 11.7%Language:HTML 5.8%Language:SCSS 5.4%Language:Hack 1.2%