formatting

patch-1
Dhiyaneshwaran 2024-03-02 00:03:09 +05:30 committed by GitHub
parent bc5c0b53ba
commit f21d58ffe6
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 26 additions and 20 deletions

View File

@ -1,44 +1,50 @@
id: CVE-2023-5089 id: CVE-2023-5089
info: info:
name: WordPress Defender Security Plugin - Hidden Login Bypass name: Defender Security < 4.1.0 - Protection Bypass (Hidden Login Page)
author: jpg0mez author: jpg0mez
severity: low severity: medium
description: | description: |
The Defender Security WordPress plugin before 4.1.0 does not prevent redirects to the login page via the auth_redirect WordPress function, The Defender Security WordPress plugin before 4.1.0 does not
allowing an unauthenticated visitor to access the login page, even when the hide login page functionality of the plugin is enabled. prevent redirects to the login page via the auth_redirect WordPress
-----IMPORTANT------ function, allowing an unauthenticated visitor to access the login page, even
Note: This PoC calls the auth_redirect function via GravityForms (gf_page). Most WordPress plugins that hide the login page are vulnerable when the hide login page functionality of the plugin is enabled.
to this, so be sure to confirm the target is using WP-Defender. remediation: Fixed in 4.1.0
remediation: |
Upgrade to the latest version to mitigate this vulnerability.
reference: reference:
- https://www.sprocketsecurity.com/resources/discovering-wp-admin-urls-in-wordpress-with-gravityforms - https://www.sprocketsecurity.com/resources/discovering-wp-admin-urls-in-wordpress-with-gravityforms
- https://wpscan.com/vulnerability/2b547488-187b-44bc-a57d-f876a7d4c87d/ - https://wpscan.com/vulnerability/2b547488-187b-44bc-a57d-f876a7d4c87d/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5089 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5089
tags: wordpress,cve,cve2023,bypass classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2023-5089
epss-score: 0.00046
epss-percentile: 0.13944
cpe: cpe:2.3:a:wpmudev:defender_security:*:*:*:*:*:wordpress:*:*
metadata:
vendor: wpmudev
product: defender_security
framework: wordpress
tags: cve,cve2023,wordpress,wpscan,defender,wp-plugin,redirect
http: http:
- method: GET - method: GET
path: path:
- "{{BaseURL}}/?gf_page=randomstring" - "{{BaseURL}}/?gf_page=randomstring"
cookie-reuse: true
redirects: true redirects: true
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body
words: words:
- "loginform" - loginform
- "password" - password
- "Powered by WordPress" - Powered by WordPress
condition: and condition: and
- type: word - type: word
words: words:
- "wp-login.php" - wp-login.php
part: header part: header
negative: true negative: true
- type: word
words:
- "wp-login.php"
part: body
negative: true