# N/A
## 概述
Abandoned Cart Lite for WooCommerce 插件存在身份验证绕过漏洞,影响版本至 5.14.2。该漏洞是由于在解码废弃购物车链接时对用户信息加密不足导致的。未认证攻击者可以利用该漏洞以废弃购物车的用户,通常是顾客,的身份登录。
## 影响版本
- 5.14.2 及之前的版本
## 细节
在废弃购物车链接解码过程中,对用户信息的加密不足,导致身份验证被绕过。在 5.15.1 版本中,引入了额外的安全强化措施,确保过去的结账链接不再可以被利用。5.15.2 版本中进一步加强了安全措施,防止使用空密钥值进行身份验证绕过。
## 影响
未认证攻击者可以冒充废弃购物车的用户登录,这可能涉及用户信息泄露和未经授权的访问。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress | https://github.com/Ayantaker/CVE-2023-2986 | POC详情 |
2 | Proof of Concept for vulnerability CVE-2023-2986 in 'Abandoned Cart Lite for WooCommerce' Plugin in WordPress in Python Version | https://github.com/Alucard0x1/CVE-2023-2986 | POC详情 |
3 | The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-2986.yaml | POC详情 |
4 | The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2023/CVE-2023-2986.yaml | POC详情 |
暂无评论