Skip to content

Commit d170db9

Browse files
authored
Merge pull request #785 from Captain-T2004/master
Added new module, CVE_2023_6875
2 parents cfa711f + a000a23 commit d170db9

File tree

1 file changed

+51
-0
lines changed

1 file changed

+51
-0
lines changed
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
info:
2+
name: wp_plugin_cve_2023_6875_vuln
3+
author: Captain-T2004
4+
severity: 9
5+
description: POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress <= 2.8.7 – Unauthenticated Stored Cross-Site Scripting via device
6+
reference:
7+
- https://nvd.nist.gov/vuln/detail/CVE-2023-6875
8+
- https://www.wordfence.com/blog/2024/01/type-juggling-leads-to-two-vulnerabilities-in-post-smtp-mailer-wordpress-plugin/
9+
- https://www.cve.org/CVERecord?id=CVE-2023-6875
10+
profiles:
11+
- vuln
12+
- vulnerability
13+
- http
14+
- critical_severity
15+
- cve2023
16+
- cve
17+
- wordpress
18+
- wp_plugin
19+
20+
payloads:
21+
- library: http
22+
steps:
23+
- method: post
24+
timeout: 3
25+
headers:
26+
User-Agent: "{user_agent}"
27+
allow_redirects: false
28+
ssl: false
29+
url:
30+
nettacker_fuzzer:
31+
input_format: "{{schema}}://{target}:{{ports}}/wp-json/post-smtp/v1/connect-app"
32+
prefix: ""
33+
suffix: ""
34+
interceptors:
35+
data:
36+
schema:
37+
- "http"
38+
- "https"
39+
ports:
40+
- 80
41+
- 443
42+
response:
43+
success_conditions: content
44+
condition_type: and
45+
conditions:
46+
content:
47+
regex: "fcm_token"
48+
reverse: false
49+
status_code:
50+
regex: "200"
51+
reverse: false

0 commit comments

Comments
 (0)