WordPress Toolbar <= 2.2.6 - Open Redirect
ID: CVE-2023-6389
Severity: medium
Author: s4e-io
Tags: wpscan,cve,cve2023,wordpress,wp-plugin,wordpress-toolbar,wp,redirect,abhinavsingh
Description
Section titled “Description”The plugin redirects to any URL via the “wptbto” parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
YAML Source
Section titled “YAML Source”id: CVE-2023-6389
info: name: WordPress Toolbar <= 2.2.6 - Open Redirect author: s4e-io severity: medium description: | The plugin redirects to any URL via the "wptbto" parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action. reference: - https://wpscan.com/vulnerability/04dafc55-3a8d-4dd2-96da-7a8b100e5a81/ - https://nvd.nist.gov/vuln/detail/CVE-2023-6389 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-6389 cwe-id: CWE-601 epss-score: 0.00097 epss-percentile: 0.40297 cpe: cpe:2.3:a:abhinavsingh:wordpress_toolbar:*:*:*:*:*:*:wordpress:* metadata: verified: true max-request: 1 vendor: abhinavsingh product: wordpress_toolbar shodan-query: http.html:/wp-content/plugins/wordpress-toolbar/ fofa-query: body=/wp-content/plugins/wordpress-toolbar/ publicwww-query: "/wp-content/plugins/wordpress-toolbar/" tags: wpscan,cve,cve2023,wordpress,wp-plugin,wordpress-toolbar,wp,redirect,abhinavsingh
http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/wordpress-toolbar/toolbar.php?wptbto=https://oast.me&wptbhash=acme"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$'# digest: 4a0a0047304502205c9ace23154d65de2b7b2c28ae00f4bb5ca14767f0fa78b7e695b20c03c421bd022100fdfd400fe74e25d5768d79393b7c2dcde9755ec4814c15987d580f0571bc4a4e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-6389.yaml"