Lucene search

K
wpvulndbRoshan CheriyanWPVDB-ID:07B293CF-5174-45DE-8606-A782A96A35B3
HistoryJun 05, 2024 - 12:00 a.m.

Bookster <= 1.1.0 - Unauthenticated Appointment Status Update

2024-06-0500:00:00
Roshan Cheriyan
wpscan.com
1
wordpress
appointment
vulnerability
unauthenticated
data manipulation
security flaw
burp suite

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Description The plugin allows adding sensitive parameters when validating appointments allowing attackers to manipulate the data sent when booking an appointment (the request body) to change its status from pending to approved.

PoC

1. Open the Wordpress where the plugin is installed with default settings. 2. Create an appointment on a service offered. Select the agent and date of appointment. 3. Provide the user information. Such as name, email, phonenumber, Select the payment method and click on submit. 4. Intercept the traffic using burp-suite. Add the parameter “book_status” with value “approved” on “apptInput” json dictionary. 5. Submit the request and observed that the booking status is changed to approved.

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for WPVDB-ID:07B293CF-5174-45DE-8606-A782A96A35B3