Update CVE-2023-6623.yaml

patch-1
Dhiyaneshwaran 2024-01-04 14:46:10 +05:30 committed by GitHub
parent f19a2f2030
commit 33031d6c08
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 8 additions and 1 deletions

View File

@ -12,6 +12,7 @@ info:
reference:
- https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f/
- https://flysec-blog.blogspot.com/2024/01/cve-2023-6623-file-inclusion.html
- https://s3cur1ty.ch/posts/essential-blocks/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
@ -19,7 +20,8 @@ info:
metadata:
verified: true
max-request: 1
tags: wp,wordpress,wp-plugin,unauth,cve,cve2023,lfi,wpscan
publicwww-query: "/wp-content/plugins/essential-blocks/"
tags: cve,cve2023,wordpress,wp-plugin,wpscan,essential-blocks,lfi
http:
- method: GET
@ -33,6 +35,11 @@ http:
regex:
- "root:.*:0:0:"
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200