WordPress Woody Ad Snippets <2.2.5 - Cross-Site Scripting/Remote Code Execution
ID: CVE-2019-15858
Severity: high
Author: dwisiswant0,fmunozs,patralos
Tags: cve,cve2019,wordpress,wp-plugin,xss,wp,webcraftic
Description
Section titled “Description”WordPress Woody Ad Snippets prior to 2.2.5 is susceptible to cross-site scripting and remote code execution via admin/includes/class.import.snippet.php, which allows unauthenticated options import as demonstrated by storing a cross-site scripting payload for remote code execution.
YAML Source
Section titled “YAML Source”id: CVE-2019-15858
info: name: WordPress Woody Ad Snippets <2.2.5 - Cross-Site Scripting/Remote Code Execution author: dwisiswant0,fmunozs,patralos severity: high description: | WordPress Woody Ad Snippets prior to 2.2.5 is susceptible to cross-site scripting and remote code execution via admin/includes/class.import.snippet.php, which allows unauthenticated options import as demonstrated by storing a cross-site scripting payload for remote code execution. impact: | Successful exploitation of this vulnerability could lead to unauthorized access, data theft, and remote code execution. remediation: | Update to the latest version of the Woody Ad Snippets plugin (2.2.5) or apply the vendor-provided patch to mitigate the vulnerability. reference: - https://github.com/GeneralEG/CVE-2019-15858 - https://blog.nintechnet.com/multiple-vulnerabilities-in-wordpress-woody-ad-snippets-plugin-lead-to-remote-code-execution/ - https://wpvulndb.com/vulnerabilities/9490 - https://nvd.nist.gov/vuln/detail/CVE-2019-15858 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2019-15858 cwe-id: CWE-306 epss-score: 0.02804 epss-percentile: 0.90638 cpe: cpe:2.3:a:webcraftic:woody_ad_snippets:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: webcraftic product: woody_ad_snippets framework: wordpress tags: cve,cve2019,wordpress,wp-plugin,xss,wp,webcraftic
http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/insert-php/readme.txt"
matchers-condition: and matchers: - type: word part: body negative: true words: - "2.2.5"
- type: word part: body words: - "Changelog"
- type: word part: body words: - "Woody ad snippets"
- type: status status: - 200# digest: 4a0a00473045022100b970cb0ebb9464542a89365f1ad8249eea44b64b88cc1fc55de019ebb7dc7a93022061f4dc82f5afb7d69b320d75417595ddb286aba8953553d358a47f4334696734:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-15858.yaml"