diff --git a/cves/2021/CVE-2021-21389.yaml b/cves/2021/CVE-2021-21389.yaml new file mode 100644 index 0000000000..a2d992ffd9 --- /dev/null +++ b/cves/2021/CVE-2021-21389.yaml @@ -0,0 +1,47 @@ +id: CVE-2021-21389 + +info: + name: BuddyPress REST API Privilege Escalation to RCE + author: lotusdll + severity: critical + description: The BuddyPress WordPress plugin was affected by an REST API Privilege Escalation to RCE + reference: | + - https://github.com/HoangKien1020/CVE-2021-21389 + - https://nvd.nist.gov/vuln/detail/CVE-2021-21389 + tags: cve,cve2021,wordpress,wp-plugin,rce + + +requests: + - raw: + - | + POST /wp-json/buddypress/v1/signup HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36 + Content-Type: application/json; charset=UTF-8 + + { + "user_login":"{{randstr}}", + "password":"{{randstr}}", + "user_name":"{{randstr}}", + "user_email":"{{randstr}}@example.com" + } + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "application/json" + part: header + + - type: word + words: + - "user_login" + - "registered" + - "activation_key" + - "user_email" + part: body + condition: and