Skip to content

Commit

Permalink
20241025
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Oct 25, 2024
1 parent 531e096 commit bda9b36
Show file tree
Hide file tree
Showing 101 changed files with 5,942 additions and 1 deletion.
2 changes: 1 addition & 1 deletion date.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
20241024
20241025
99 changes: 99 additions & 0 deletions poc.txt

Large diffs are not rendered by default.

59 changes: 59 additions & 0 deletions poc/auth/author-discussion.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: author-discussion

info:
name: >
Author Discussion <= 0.2.2 - Authenticated (Subscriber+) SQL Injection
author: topscoder
severity: low
description: >
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8fcc8b94-6ed3-4784-93f3-ec1654d197bd?source=api-scan
classification:
cvss-metrics:
cvss-score:
cve-id:
metadata:
fofa-query: "wp-content/plugins/author-discussion/"
google-query: inurl:"/wp-content/plugins/author-discussion/"
shodan-query: 'vuln:'
tags: cve,wordpress,wp-plugin,author-discussion,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/author-discussion/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "author-discussion"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 0.2.2')
59 changes: 59 additions & 0 deletions poc/aws/CVE-2024-8666-908b61c7df30cf8fad96ec25610ac7b3.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-8666-908b61c7df30cf8fad96ec25610ac7b3

info:
name: >
Shoutcast Icecast HTML5 Radio Player <= 2.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting
author: topscoder
severity: low
description: >
The Shoutcast Icecast HTML5 Radio Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'html5radio' shortcode in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/7e870ae2-abae-457a-b3d1-75a96ec09d41?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2024-8666
metadata:
fofa-query: "wp-content/plugins/shoutcast-icecast-html5-radio-player/"
google-query: inurl:"/wp-content/plugins/shoutcast-icecast-html5-radio-player/"
shodan-query: 'vuln:CVE-2024-8666'
tags: cve,wordpress,wp-plugin,shoutcast-icecast-html5-radio-player,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/shoutcast-icecast-html5-radio-player/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "shoutcast-icecast-html5-radio-player"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.1.6')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10011-eefe8c0c540af6a79376e37c4cbbfad9.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10011-eefe8c0c540af6a79376e37c4cbbfad9

info:
name: >
BuddyPress <= 14.1.0 - Authenticated (Subscriber+) Directory Traversal
author: topscoder
severity: low
description: >
The BuddyPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 14.1.0 via the id parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory and enables file uploads to directories outside of the web root. Depending on server configuration it may be possible to upload files with double extensions. This vulnerability only affects Windows.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4327f414-64f4-4193-a5c0-2a5ecdd75e11?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
cvss-score: 8.1
cve-id: CVE-2024-10011
metadata:
fofa-query: "wp-content/plugins/buddypress/"
google-query: inurl:"/wp-content/plugins/buddypress/"
shodan-query: 'vuln:CVE-2024-10011'
tags: cve,wordpress,wp-plugin,buddypress,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/buddypress/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "buddypress"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 14.1.0')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10016-178761d7d6f8e5f5807de98de6404c48.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10016-178761d7d6f8e5f5807de98de6404c48

info:
name: >
File Upload Types by WPForms <= 1.4.0 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
author: topscoder
severity: low
description: >
The File Upload Types by WPForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/17988a66-5b48-4f57-96f8-74e539bc875e?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2024-10016
metadata:
fofa-query: "wp-content/plugins/file-upload-types/"
google-query: inurl:"/wp-content/plugins/file-upload-types/"
shodan-query: 'vuln:CVE-2024-10016'
tags: cve,wordpress,wp-plugin,file-upload-types,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/file-upload-types/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "file-upload-types"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.4.0')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10050.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10050

info:
name: >
Elementor Header & Footer Builder <= 1.6.43 - Authenticated (Contributor+) Information Disclosure via Shortcode
author: topscoder
severity: low
description: >
The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 1.6.43 via the hfe_template shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to view the contents of Draft, Private and Password-protected posts they do not own.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/662f6ae2-2047-4bbf-b4a6-2d536051e389?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss-score: 4.3
cve-id: CVE-2024-10050
metadata:
fofa-query: "wp-content/plugins/header-footer-elementor/"
google-query: inurl:"/wp-content/plugins/header-footer-elementor/"
shodan-query: 'vuln:CVE-2024-10050'
tags: cve,wordpress,wp-plugin,header-footer-elementor,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/header-footer-elementor/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "header-footer-elementor"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 1.6.43')
59 changes: 59 additions & 0 deletions poc/cve/CVE-2024-10112-b49134293bd607a2527227eff1da1897.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
id: CVE-2024-10112-b49134293bd607a2527227eff1da1897

info:
name: >
Simple News <= 2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via news Shortcode
author: topscoder
severity: low
description: >
The Simple News plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'news' shortcode in all versions up to, and including, 2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
reference:
- https://github.com/topscoder/nuclei-wordfence-cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/79147dad-4bce-40fb-b9c1-e211845251a0?source=api-prod
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
cvss-score: 6.4
cve-id: CVE-2024-10112
metadata:
fofa-query: "wp-content/plugins/simple-news/"
google-query: inurl:"/wp-content/plugins/simple-news/"
shodan-query: 'vuln:CVE-2024-10112'
tags: cve,wordpress,wp-plugin,simple-news,low

http:
- method: GET
redirects: true
max-redirects: 3
path:
- "{{BaseURL}}/wp-content/plugins/simple-news/readme.txt"

extractors:
- type: regex
name: version
part: body
group: 1
internal: true
regex:
- "(?mi)Stable tag: ([0-9.]+)"

- type: regex
name: version
part: body
group: 1
regex:
- "(?mi)Stable tag: ([0-9.]+)"

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
words:
- "simple-news"
part: body

- type: dsl
dsl:
- compare_versions(version, '<= 2.8')
Loading

0 comments on commit bda9b36

Please sign in to comment.