Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310126388
HistoryMar 15, 2023 - 12:00 a.m.

WordPress Ocean Extra Plugin < 2.1.3 Authentication Bypass Vulnerability

2023-03-1500:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
wordpress
ocean extra
authentication bypass
vulnerability
update
greenbone ag
cve-2023-0749
web application abuses
remote banner

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

30.4%

The WordPress plugin

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:oceanwp:ocean_extra";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.126388");
  script_version("2023-10-13T16:09:03+0000");
  script_tag(name:"last_modification", value:"2023-10-13 16:09:03 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-03-15 09:29:24 +0000 (Wed, 15 Mar 2023)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:N/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-03-16 15:54:00 +0000 (Thu, 16 Mar 2023)");

  script_cve_id("CVE-2023-0749");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("WordPress Ocean Extra Plugin < 2.1.3 Authentication Bypass Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_wordpress_plugin_http_detect.nasl");
  script_mandatory_keys("wordpress/plugin/ocean-extra/detected");

  script_tag(name:"summary", value:"The WordPress plugin 'Ocean Extra' is prone to an
  authentication bypass vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The plugin does not ensure that the template to be loaded via
  a shortcode is actually a template, allowing any authenticated users to retrieve the content of
  arbitrary posts, such as draft, private or even password protected ones.");

  script_tag(name:"affected", value:"WordPress Ocean Extra plugin prior to version 2.1.3.");

  script_tag(name:"solution", value:"Update to version 2.1.3 or later.");

  script_xref(name:"URL", value:"https://wpscan.com/vulnerability/9caa8d2e-383b-47d7-8d21-d2ed6b1664cb");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if ( ! port = get_app_port( cpe:CPE ) )
  exit( 0 );

if ( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
  exit( 0 );

version = infos["version"];
location = infos["location"];

if ( version_is_less( version:version, test_version:"2.1.3" ) ) {
  report = report_fixed_ver( installed_version:version, fixed_version:"2.1.3", install_path:location );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

30.4%

Related for OPENVAS:1361412562310126388