Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310127466
HistoryJun 09, 2023 - 12:00 a.m.

WordPress Fastest Cache Plugin < 1.1.5 SSRF Vulnerability

2023-06-0900:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
wordpress
fastest cache
ssrf
vulnerability
server-side
request forgery
security issue
update.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.002

Percentile

61.7%

The WordPress plugin

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:wpfastestcache:wp_fastest_cache";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.127466");
  script_version("2023-10-13T16:09:03+0000");
  script_tag(name:"last_modification", value:"2023-10-13 16:09:03 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-06-09 07:35:51 +0200 (Fri, 09 Jun 2023)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-06-05 14:51:00 +0000 (Mon, 05 Jun 2023)");

  script_cve_id("CVE-2023-1938");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("WordPress Fastest Cache Plugin < 1.1.5 SSRF Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_wordpress_plugin_http_detect.nasl");
  script_mandatory_keys("wordpress/plugin/wp-fastest-cache/detected");

  script_tag(name:"summary", value:"The WordPress plugin 'Fastest Cache' is prone to an server-side
  request forgery (SSRF) vulnerability.");

  script_tag(name:"insight", value:"The plugin does not have cross-site request forgery (CSRF)
  check in an AJAX action, and does not validate user input before using it in the wp_remote_get()
  function, leading to a blind server-side request forgery (SSRF) issue.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"affected", value:"WordPress Fastest Cache plugin prior to version 1.1.5.");

  script_tag(name:"solution", value:"Update to version 1.1.5 or later.");

  script_xref(name:"URL", value:"https://wpscan.com/vulnerability/92b1c6d8-51db-46aa-bde6-abdfb091aab5");


  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! port = get_app_port( cpe: CPE ) )
  exit( 0 );

if( ! infos = get_app_version_and_location( cpe: CPE, port: port, exit_no_version: TRUE ) )
  exit( 0 );

version = infos["version"];
location = infos["location"];

if( version_is_less( version: version, test_version: "1.1.5" ) ) {
  report = report_fixed_ver( installed_version: version, fixed_version: "1.1.5", install_path: location );
  security_message( port: port, data: report );
  exit( 0 );
}

exit( 99 );

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.002

Percentile

61.7%

Related for OPENVAS:1361412562310127466