Update CVE-2024-6845.yaml

patch-12
Ritik Chaddha 2024-09-30 11:57:49 +04:00 committed by GitHub
parent 67dbc951f6
commit 9b7d469cb5
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 5 additions and 6 deletions

View File

@ -1,15 +1,15 @@
id: CVE-2024-6845
info:
name: SmartSearchWP < 2.4.6 - Unauthenticated OpenAI Key Disclosure
name: SmartSearchWP < 2.4.6 - OpenAI Key Disclosure
author: s4e-io
severity: medium
description: |
The plugin does not have proper authorization in one of its REST endpoint, allowing unauthenticated users to retrieve the encoded key and then decode it, thereby leaking the OpenAI API key.
remediation: Fixed in 2.4.6
reference:
- https://cvefeed.io/vuln/detail/CVE-2024-6845
- https://wpscan.com/vulnerability/cfaaa843-d89e-42d4-90d9-988293499d26/
- https://nvd.nist.gov/vuln/detail/CVE-2024-6845
metadata:
max-request: 2
verified: true
@ -18,21 +18,20 @@ info:
framework: wordpress
publicwww-query: "/wp-content/plugins/smartsearchwp"
fofa-query: body="/wp-content/plugins/smartsearchwp"
tags: cve,cve2024,info-leak,wordpress,wp-plugin,smartsearchwp,wpscan
tags: cve,cve2024,exposure,wp,wordpress,wp-plugin,smartsearchwp
flow: http(1) && http(2)
http:
- raw:
- |
GET /wp-content/plugins/smartsearchwp/readme.txt HTTP/1.1
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body,"Chatbot with ChatGPT Wordpress")'
- 'contains(content_type,"text/plain")'
- 'contains(body,"/wp-content/plugins/smartsearchwp")'
- 'status_code == 200'
condition: and
internal: true