<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Abrahack&#39;s Blog</title>
    <link>https://abrahack.com/</link>
    <description>Recent content on Abrahack&#39;s Blog</description>
    <generator>Hugo</generator>
    <language>en</language>
    <copyright>© 2025, abrahack.com</copyright>
    <lastBuildDate>Fri, 28 Mar 2025 02:00:00 +0100</lastBuildDate>
    <atom:link href="https://abrahack.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Quiz Maker SQLi</title>
      <link>https://abrahack.com/posts/quiz-maker-sqli/</link>
      <pubDate>Fri, 28 Mar 2025 02:00:00 +0100</pubDate>
      <guid>https://abrahack.com/posts/quiz-maker-sqli/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;In this post, I&amp;rsquo;ll walk through the discovery and analysis of &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10628&#34;&gt;CVE-2024-10628&lt;/a&gt;, a high impact vulnerability (CVSS 3.1 Score: 7.5). This vulnerability allows unauthenticated attackers to perform unauthenticated SQLi attacks.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;During an offsite security assessment, I noticed the &lt;a href=&#34;https://ays-pro.com/wordpress/quiz-maker&#34;&gt;Quiz Maker&lt;/a&gt; plugin installed on a customer&amp;rsquo;s WordPress instance. As part of my standard methodology, I obtained &lt;em&gt;Business&lt;/em&gt; version 8.8.0 of the plugin for local analysis, which led to the discovery of an unauthenticated SQLi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Gamipress SQLi</title>
      <link>https://abrahack.com/posts/gamipress-sqli/</link>
      <pubDate>Mon, 24 Mar 2025 02:00:00 +0100</pubDate>
      <guid>https://abrahack.com/posts/gamipress-sqli/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;In this post, I&amp;rsquo;ll walk through the discovery and analysis of &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13496&#34;&gt;CVE-2024-13496&lt;/a&gt;, a high impact vulnerability (CVSS 3.1 Score: 7.5). This vulnerability allows unauthenticated attackers to perform unauthenticated SQLi attacks.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;During an offsite security assessment, I noticed the &lt;a href=&#34;https://wordpress.org/plugins/gamipress/&#34;&gt;GamiPress&lt;/a&gt; plugin installed on a customer&amp;rsquo;s WordPress instance. As part of my standard methodology, I downloaded version 7.2.1 of the plugin for local analysis, which led to the discovery of an unauthenticated SQLi.&lt;/p&gt;</description>
    </item>
    <item>
      <title>WordPress File Upload RCE Part2</title>
      <link>https://abrahack.com/posts/wp-file-upload-rce-part2/</link>
      <pubDate>Fri, 14 Mar 2025 02:00:00 +0100</pubDate>
      <guid>https://abrahack.com/posts/wp-file-upload-rce-part2/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;In my &lt;a href=&#34;https://abrahack.com/posts/wp-file-upload-rce-part1/&#34;&gt;previous post&lt;/a&gt;, I detailed the discovery of &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9939&#34;&gt;CVE-2024-9939&lt;/a&gt; and &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11635&#34;&gt;CVE-2024-11635&lt;/a&gt;, high-impact vulnerabilities affecting the WordPress File Upload plugin. As promised, this follow-up examines how the vendor&amp;rsquo;s patch inadvertently introduced a new critical vulnerability (CVSS 3.1 Score: 9.8): &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11613&#34;&gt;CVE-2024-11613&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;After reporting the initial vulnerabilities, the WordPress File Upload plugin was updated to version 4.24.14, which removed the use of cookie-based inputs. However, during my post-patch analysis, I discovered that this fix created a new attack vector with equally severe implications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>WordPress File Upload RCE Part1</title>
      <link>https://abrahack.com/posts/wp-file-upload-rce-part1/</link>
      <pubDate>Fri, 07 Mar 2025 02:00:00 +0100</pubDate>
      <guid>https://abrahack.com/posts/wp-file-upload-rce-part1/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;In this post, I&amp;rsquo;ll walk through the discovery and analysis of &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9939&#34;&gt;CVE-2024-9939&lt;/a&gt;, a high impact vulnerability (CVSS 3.1 Score: 7.5) and &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11635&#34;&gt;CVE-2024-11635&lt;/a&gt;, a critical impact vulnerability (CVSS 3.1 Score: 9.8) affecting the &lt;a href=&#34;https://wordpress.org/plugins/wp-file-upload/&#34;&gt;WordPress File Upload Plugin&lt;/a&gt;. This vulnerability allows unauthenticated attackers to perform Arbitrary File Read and Remote Code Execution attacks.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;During an offsite security assessment, I noticed the &lt;a href=&#34;https://wordpress.org/plugins/wp-file-upload/&#34;&gt;WordPress File Upload Plugin&lt;/a&gt; installed on a customer&amp;rsquo;s WordPress instance. As part of my standard methodology, I downloaded version 4.24.11 of the plugin for local analysis, which led to the discovery of two severe security flaws;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learnpress Sensitive Information Exposure</title>
      <link>https://abrahack.com/posts/learnpress-sensitive-information-exposure/</link>
      <pubDate>Sat, 25 Jan 2025 05:00:00 +0100</pubDate>
      <guid>https://abrahack.com/posts/learnpress-sensitive-information-exposure/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;This post details the discovery and analysis of &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11868&#34;&gt;CVE-2024-11868&lt;/a&gt;, a medium-severity vulnerability (CVSS 3.1: 5.3) in the &lt;a href=&#34;https://wordpress.org/plugins/learnpress/&#34;&gt;LearnPress – WordPress LMS Plugin&lt;/a&gt;. The flaw allows &lt;strong&gt;unauthenticated attackers&lt;/strong&gt; to access sensitive course materials, &lt;strong&gt;bypassing payment requirements&lt;/strong&gt;.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;Following my &lt;a href=&#34;https://abrahack.com/posts/learnpress-sqli/&#34;&gt;previous analysis&lt;/a&gt; of LearnPress, I revisited the plugin to audit the latest version (4.2.7.3). Within hours, I identified an unauthenticated &lt;strong&gt;Sensitive Information Exposure&lt;/strong&gt; vulnerability affecting paid course content.&lt;/p&gt;&#xA;&lt;h3 id=&#34;affected-versions&#34;&gt;Affected Versions&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Plugin: LearnPress – WordPress LMS Plugin&lt;/li&gt;&#xA;&lt;li&gt;Version: ≤ 4.2.7.3&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;initial-analysis&#34;&gt;Initial Analysis&lt;/h3&gt;&#xA;&lt;p&gt;My vulnerability discovery process began by identifying potential entry points. So I began to look for potential REST endpoints, with unauthenticated access.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Chart Builder LFI</title>
      <link>https://abrahack.com/posts/chart-builder-lfi/</link>
      <pubDate>Mon, 13 Jan 2025 05:22:41 +0100</pubDate>
      <guid>https://abrahack.com/posts/chart-builder-lfi/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;&#xA;&lt;p&gt;In this post, I&amp;rsquo;ll walk through the discovery and analysis of &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10571&#34;&gt;CVE-2024-10571&lt;/a&gt;, a critical vulnerability (CVSS 3.1 Score: 9.8) affecting the &lt;a href=&#34;https://wordpress.org/plugins/chart-builder/&#34;&gt;Chartify – WordPress Chart Plugin&lt;/a&gt;. This vulnerability allows unauthenticated attackers to perform Local File Inclusion (LFI) attacks.&lt;/p&gt;&#xA;&lt;h2 id=&#34;background&#34;&gt;Background&lt;/h2&gt;&#xA;&lt;p&gt;During an offsite security assessment, I noticed the &lt;a href=&#34;https://wordpress.org/plugins/chart-builder/&#34;&gt;Chartify – WordPress Chart Plugin&lt;/a&gt; plugin installed on a customer&amp;rsquo;s WordPress instance. As part of my standard methodology, I downloaded version 2.9.4 of the plugin for local analysis. This routine audit led to the discovery of a severe security flaw.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Learnpress SQLi</title>
      <link>https://abrahack.com/posts/learnpress-sqli/</link>
      <pubDate>Thu, 07 Nov 2024 00:18:42 +0100</pubDate>
      <guid>https://abrahack.com/posts/learnpress-sqli/</guid>
      <description>&lt;h2 id=&#34;intro&#34;&gt;Intro.&lt;/h2&gt;&#xA;&lt;p&gt;In this post we will be exploring two CVE&amp;rsquo;s, &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8529&#34;&gt;CVE-2024-8529&lt;/a&gt; - &lt;a href=&#34;https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;&gt;CVSS 3.1 10.0 Critical&lt;/a&gt; &amp;amp; &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8522&#34;&gt;CVE-2024-8522&lt;/a&gt; - &lt;a href=&#34;https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H&#34;&gt;CVSS 3.1 10.0 Critical&lt;/a&gt; affecting &lt;a href=&#34;https://wordpress.org/plugins/learnpress/&#34;&gt;LearnPress – WordPress LMS Plugin&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;A few months ago, I was engaged in a pentest and came across a WordPress asset utilizing the &lt;a href=&#34;https://wordpress.org/plugins/learnpress/&#34;&gt;LearnPress – WordPress LMS Plugin&lt;/a&gt;. I quickly confirmed the version and realized the latest version had been installed, therefore no known CVEs would work.&lt;/p&gt;&#xA;&lt;p&gt;I decided to review past vulnerabilities on the plugin and their respective patches to see whether I could find a bypass.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Metabase One Click Rce</title>
      <link>https://abrahack.com/posts/metabase-one-click-rce/</link>
      <pubDate>Sun, 06 Oct 2024 17:49:28 +0100</pubDate>
      <guid>https://abrahack.com/posts/metabase-one-click-rce/</guid>
      <description>&lt;h2 id=&#34;intro&#34;&gt;Intro.&lt;/h2&gt;&#xA;&lt;p&gt;In this post we would be exploring a chain of two CVE&amp;rsquo;s &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39362&#34;&gt;CVE-2022-39362&lt;/a&gt; &amp;amp; &lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39361&#34;&gt;CVE-2022-39361&lt;/a&gt; affecting &lt;a href=&#34;https://github.com/metabase/metabase&#34;&gt;MetaBase&lt;/a&gt; .&lt;/p&gt;&#xA;&lt;h2 id=&#34;cve-2022-39362&#34;&gt;CVE-2022-39362&lt;/h2&gt;&#xA;&lt;p&gt;This bug is a Cross Site Request Forgery (CSRF), this issue arose from the &lt;code&gt;/question&lt;/code&gt; endpoint.&#xA;The impact allowed an attacker arbitrary SQL queries on the target application, all an attacker needed was for a logged in user to click a link.&lt;/p&gt;&#xA;&lt;p&gt;Metabase fixed this issue, by no longer automatically executing ad-hoc native queries&lt;/p&gt;</description>
    </item>
    <item>
      <title>About</title>
      <link>https://abrahack.com/about/</link>
      <pubDate>Sat, 05 Oct 2024 00:00:00 +0000</pubDate>
      <guid>https://abrahack.com/about/</guid>
      <description>&lt;h1 id=&#34;about-me&#34;&gt;About Me&lt;/h1&gt;&#xA;&lt;p&gt;Welcome to my blog!&lt;/p&gt;&#xA;&lt;p&gt;Hi! I&amp;rsquo;m abrahack, a Security Researcher &amp;amp; Bug Bounty Hunter. This blog is a place where I share my thoughts, insights, and projects related to cyber security .&lt;/p&gt;&#xA;&lt;h2 id=&#34;why-i-started-this-blog&#34;&gt;Why I Started This Blog&lt;/h2&gt;&#xA;&lt;p&gt;I started this blog to talk about my journey so far, to rant a bit and share some knowledge.&lt;/p&gt;&#xA;&lt;h2 id=&#34;what-youll-find-here&#34;&gt;What You&amp;rsquo;ll Find Here&lt;/h2&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;strong&gt;[CVE&amp;rsquo;s]&lt;/strong&gt;: Here we would explore CVEs indepth, either ones found my me or by other researchers.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;[Bug Bounty Findings]&lt;/strong&gt;: Here we would explore my past exploits during bug bounty research.&lt;/li&gt;&#xA;&lt;li&gt;&lt;strong&gt;[Rants]&lt;/strong&gt;: Here I express complaints and philosophical opinions about cyber security in general.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;I hope you&amp;rsquo;ll find something useful, inspiring, or interesting during your visit!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Contact</title>
      <link>https://abrahack.com/contact/</link>
      <pubDate>Sat, 05 Oct 2024 00:00:00 +0000</pubDate>
      <guid>https://abrahack.com/contact/</guid>
      <description>&lt;p&gt;Reach me at: &lt;a href=&#34;https://x.com/theabrahack&#34;&gt;On X, my DM&amp;rsquo;s are open&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Newsletter</title>
      <link>https://abrahack.com/newsletter/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://abrahack.com/newsletter/</guid>
      <description>&lt;p&gt;Stay updated with our latest security research, CVEs, and more. Subscribe now!&lt;/p&gt;&#xA;&lt;div id=&#34;newsletter-signup&#34;&gt;&#xA;&lt;/div&gt;&#xA;&lt;script src=&#34;https://abrahack.com/js/newsletter.js&#34; defer&gt;&lt;/script&gt;</description>
    </item>
  </channel>
</rss>
