Skip to content

Commit

Permalink
20241120
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Nov 20, 2024
1 parent 1e0a77b commit 593d5ce
Show file tree
Hide file tree
Showing 67 changed files with 3,871 additions and 1 deletion.
2 changes: 1 addition & 1 deletion date.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
20241119
20241120
65 changes: 65 additions & 0 deletions poc.txt

Large diffs are not rendered by default.

59 changes: 59 additions & 0 deletions poc/api/mstore-api-a1fd15e9b76a3b82e1c25ef611ae13f2.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: mstore-api-a1fd15e9b76a3b82e1c25ef611ae13f2

info:
name: >
MStore API <= 4.15.7 - Authenticated (Subscriber+) SQL Injection
author: topscoder
severity: low
description: >
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b308bddf-a153-4d5b-936f-2170a1a494a5?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/mstore-api/"
google-query: inurl:"/wp-content/plugins/mstore-api/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,mstore-api,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/mstore-api/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "mstore-api"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 4.15.7')
59 changes: 59 additions & 0 deletions poc/aws/CVE-2024-8726-af04205ec2aa66e95143c13c3f26c97b.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-8726-af04205ec2aa66e95143c13c3f26c97b

info:
name: >
MailChimp Forms by MailMunch <= 3.2.3 - Reflected Cross-Site Scripting
author: topscoder
severity: medium
description: >
The MailChimp Forms by MailMunch plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.2.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a1a1c5e7-75a4-4ca5-9707-4076b92e0c33?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2024-8726
metadata:
fofa-query: "wp-content/plugins/mailchimp-forms-by-mailmunch/"
google-query: inurl:"/wp-content/plugins/mailchimp-forms-by-mailmunch/"
shodan-query: 'vuln:CVE-2024-8726'
tags: cve,wordpress,wp-plugin,mailchimp-forms-by-mailmunch,medium

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/mailchimp-forms-by-mailmunch/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "mailchimp-forms-by-mailmunch"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 3.2.3')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10268.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10268

info:
name: >
MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar <= 5.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via sonaar_audioplayer Shortcode
author: topscoder
severity: low
description: >
The MP3 Audio Player – Music Player, Podcast Player & Radio by Sonaar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sonaar_audioplayer shortcode in all versions up to, and including, 5.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/861d0218-0f0f-4299-a0ff-854832348457?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2024-10268
metadata:
fofa-query: "wp-content/plugins/mp3-music-player-by-sonaar/"
google-query: inurl:"/wp-content/plugins/mp3-music-player-by-sonaar/"
shodan-query: 'vuln:CVE-2024-10268'
tags: cve,wordpress,wp-plugin,mp3-music-player-by-sonaar,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/mp3-music-player-by-sonaar/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "mp3-music-player-by-sonaar"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 5.8')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10365-94b2ea6d1e833df87c652f93d2e5b7eb.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10365-94b2ea6d1e833df87c652f93d2e5b7eb

info:
name: >
The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce <= 6.0.3 - Authenticated (Contributor+) Sensitive Information Exposure via Elementor Templates
author: topscoder
severity: low
description: >
The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.0.3 via the render function in modules/widgets/tp_carousel_anything.php, modules/widgets/tp_page_scroll.php, and other widgets. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ce1d19-25fa-434d-943b-d10c5cb2ec51?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2024-10365
metadata:
fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/"
google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/"
shodan-query: 'vuln:CVE-2024-10365'
tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "the-plus-addons-for-elementor-page-builder"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 6.0.3')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10388.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10388

info:
name: >
WordPress GDPR <= 2.0.2 - Unauthenticated Stored Cross-Site Scripting
author: topscoder
severity: high
description: >
The WordPress GDPR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gdpr_firstname' and 'gdpr_lastname' parameters in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/bf707d9b-2b96-4d1b-b798-38f7fe958eaf?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
cvss-score: 7.2
cve-id: CVE-2024-10388
metadata:
fofa-query: "wp-content/plugins/wordpress-gdpr/"
google-query: inurl:"/wp-content/plugins/wordpress-gdpr/"
shodan-query: 'vuln:CVE-2024-10388'
tags: cve,wordpress,wp-plugin,wordpress-gdpr,high

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/wordpress-gdpr/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "wordpress-gdpr"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.0.2')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10390.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10390

info:
name: >
Elfsight Telegram Chat CC <= 1.1.0 - Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting
author: topscoder
severity: low
description: >
The Elfsight Telegram Chat CC plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'updatePreferences' function in all versions up to, and including, 1.1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/07244763-3482-4cfb-8ae4-d19f312011aa?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2024-10390
metadata:
fofa-query: "wp-content/plugins/elfsight-telegram-chat-cc/"
google-query: inurl:"/wp-content/plugins/elfsight-telegram-chat-cc/"
shodan-query: 'vuln:CVE-2024-10390'
tags: cve,wordpress,wp-plugin,elfsight-telegram-chat-cc,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/elfsight-telegram-chat-cc/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "elfsight-telegram-chat-cc"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.1.0')
Loading

0 comments on commit 593d5ce

Please sign in to comment.