diff --git a/http/cves/2023/CVE-2023-5003.yaml b/http/cves/2023/CVE-2023-5003.yaml index 3bd92b33d8..296e6eb9cf 100644 --- a/http/cves/2023/CVE-2023-5003.yaml +++ b/http/cves/2023/CVE-2023-5003.yaml @@ -6,6 +6,7 @@ info: severity: high description: | The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so. + remediation: Fixed in 4.1.10 reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-5003 - https://wpscan.com/vulnerability/91f4e500-71f3-4ef6-9cc7-24a7c12a5748/ @@ -14,12 +15,14 @@ info: cvss-score: 7.5 cve-id: CVE-2023-5003 epss-score: 0.00084 - epss-percentile: 0.35002 + epss-percentile: 0.35074 cpe: cpe:2.3:a:miniorange:active_directory_integration_\/_ldap_integration:*:*:*:*:*:wordpress:*:* metadata: vendor: miniorange product: active_directory_integration_\/_ldap_integration framework: wordpress + verified: true + max-request: 1 tags: wpscan,exposure,csv,ldap,cve2023,wordpress,wp-plugin http: @@ -29,13 +32,14 @@ http: matchers-condition: and matchers: - - type: status - status: - - 200 - type: word words: - "ID" - "USERNAME" - "TIME" - "LDAP STATUS" - condition: and \ No newline at end of file + condition: and + + - type: status + status: + - 200