Skip to content

Conversation

@Captain-T2004
Copy link
Contributor

Checklist

  • I have followed the Contributor Guidelines.
  • The code has been thoroughly tested in my local development environment with flake8 and pylint.
  • The code is Python 3 compatible.
  • The code follows the PEP8 styling guidelines with 4 spaces indentation.
  • This Pull Request relates to only one issue or only one feature
  • I have referenced the corresponding issue number in my commit message
  • I have added the relevant documentation.
  • My branch is up-to-date with the Upstream master branch.

Changes proposed in this pull request

I have added a new module for a vuln module https://nvd.nist.gov/vuln/detail/CVE-2023-6875. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.

python3 nettacker.py -i <target> -m wp_plugin_cve_2023_6875_vuln

Your development environment

  • OS: Pop!_OS 22.04 LTS
  • OS Version: Linux pop-os 6.6.6-76060606-generic
  • Python Version: 3.10.12

@securestep9 securestep9 self-assigned this Jan 18, 2024
@securestep9 securestep9 added the new module pull request with new module(s) label Jan 18, 2024
@securestep9 securestep9 merged commit d170db9 into OWASP:master Jan 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

new module pull request with new module(s)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants