Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.WORDPRESS_PLUGIN_WORDPRESS-SEO_CVE-2024-4984.NASL
HistoryMay 31, 2024 - 12:00 a.m.

WordPress Plugin 'Yoast SEO' < 22.7 XSS

2024-05-3100:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10
wordpress
yoast seo
plugin
22.7
xss
vulnerability
authenticated
contributor-level
input sanitization
output escaping
web scripts
nessus

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

29.9%

The WordPress application running on the remote host has a version of the ‘Yoast SEO’ plugin that is prior to 22.7. It is, therefore, affected by a stored cross-site scripting (XSS) vulnerability due to insufficient input sanitization and output escaping. An authenticated attacker with contributor-level access and above could inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(198220);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/03");

  script_cve_id("CVE-2024-4984");

  script_name(english:"WordPress Plugin 'Yoast SEO' < 22.7 XSS");

  script_set_attribute(attribute:"synopsis", value:
"The remote WordPress application has a plugin installed that is affected by a XSS vulnerability.");
  script_set_attribute(attribute:"description", value:
"The WordPress application running on the remote host has a version of the 'Yoast SEO' plugin that is prior to 22.7. It 
is, therefore, affected by a stored cross-site scripting (XSS) vulnerability due to insufficient input sanitization and 
output escaping. An authenticated attacker with contributor-level access and above could inject arbitrary web scripts in
pages that will execute whenever a user accesses an injected page.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://wordpress.org/plugins/wordpress-seo/");
  script_set_attribute(attribute:"see_also", value:"https://developer.yoast.com/changelog/yoast-seo/22.7/");
  # https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wordpress-seo/yoast-seo-206-authenticated-contributor-stored-cross-site-scripting
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e83b5b63");
  script_set_attribute(attribute:"solution", value:
"Update the 'Yoast SEO' plugin to version 22.7 or later through the administrative dashboard.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-4984");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/05/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/05/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/31");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:yoast:yoast_seo");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("wordpress_plugin_detect.nbin");
  script_require_keys("installed_sw/WordPress", "www/PHP");
  script_require_ports("Services/www", 80);

  exit(0);
}

include('vcf.inc');
include('vcf_extras.inc');

var app_info = vcf::wordpress::plugin::get_app_info(plugin:'wordpress-seo');

var constraints = [
  { 'fixed_version': '22.7'}
];

vcf::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_WARNING,
  flags:{'xss': TRUE}
);

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

29.9%

Related for WORDPRESS_PLUGIN_WORDPRESS-SEO_CVE-2024-4984.NASL