Skip to content

Latest commit

 

History

History
71 lines (51 loc) · 2.87 KB

README.md

File metadata and controls

71 lines (51 loc) · 2.87 KB

Powered by Semgrep Target Wordpress plugins License LGPL 2.1 only

copertina

Greedy for SQL Injection

Slides and code used to present the research conducted together with @dipa96 in which we implemented custom templates for Semgrep with the purpose of detecting SQL Injection from the analysis of Wordpress plugin source code.

Table of contents

About

This project was presented at the ComeToCode2022 conference. The project was born out of a desire to explore the world of code review and the SemGrep tool.

Watch our presentation at: Slides_ENG

Getting Started

Project requires:

Make sure each requirement is installed correctly before proceeding.

Installing

Run the following command to download the latest version of project.

git clone https://github.com/dipa96/GreedyForSQLi

Setting up your wordpress environment. Check docker-compose.yaml file for details or change settings.

cd GreedyForSQLi
docker-compose up -d

By default you will find wordpress at: http://10.10.10.2/

Usage

Once have WordPress configured you will have plugins installed and already be able to launch your first semgrep scan with our semgrep templates.

cd GreedyForSQLi
cd rules/php/wordpress/plugins
semgrep -c ajax-action-to-sqli.yaml -c ajax-action-to-sqli-deep.yaml ../../../../plugins/wp-visual-slidebox-builder

Achievements

We started reporting vulnerabilities to WPScan. Currently these are the updated CVEs.

Contributing