updated req and matchers

patch-11
Ritik Chaddha 2024-09-10 14:47:39 +04:00 committed by GitHub
parent 8ec1280739
commit 3b51a6ab7a
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 5 additions and 4 deletions

View File

@ -9,30 +9,31 @@ info:
reference: reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/opti-marketing/opti-marketing-209-unauthenticated-sql-injection - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/opti-marketing/opti-marketing-209-unauthenticated-sql-injection
- https://wpscan.com/vulnerability/7bb9474f-2b9d-4856-b36d-a43da3db0245/ - https://wpscan.com/vulnerability/7bb9474f-2b9d-4856-b36d-a43da3db0245/
- https://nvd.nist.gov/vuln/detail/cve-2024-6928
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10 cvss-score: 10
cve-id: CVE-2024-6928 cve-id: CVE-2024-6928
metadata: metadata:
max-request: 2
vendor: opti-marketing vendor: opti-marketing
product: opti-marketing product: opti-marketing
framework: wordpress framework: wordpress
publicwww-query: "/wp-content/plugins/opti-marketing" publicwww-query: "/wp-content/plugins/opti-marketing"
tags: cve,cve2024,wpscan,wp-plugin,wordpress,opti-marketing tags: cve,cve2024,wpscan,wp-plugin,wp,wordpress,opti-marketing,sqli
flow: http(1) && http(2) flow: http(1) && http(2)
http: http:
- raw: - raw:
- | - |
GET /wp-content/plugins/opti-marketing/readme.txt HTTP/1.1 GET / HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
matchers: matchers:
- type: dsl - type: dsl
dsl: dsl:
- 'contains(body,"Opti Marketing")' - 'contains(body, "/wp-content/plugins/opti-marketing")'
- 'status_code == 200'
condition: and condition: and
internal: true internal: true