diff --git a/http/cves/2023/CVE-2023-6065.yaml b/http/cves/2023/CVE-2023-6065.yaml new file mode 100644 index 0000000000..a5af699ce8 --- /dev/null +++ b/http/cves/2023/CVE-2023-6065.yaml @@ -0,0 +1,42 @@ +id: CVE-2023-6065 + +info: + name: Quttera Web Malware Scanner <= 3.4.1.48 - Sensitive Data Exposure + author: Kazgangap + severity: medium + description: | + The Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 doesn't restrict access to detailed scan logs, which allows a malicious actor to discover local paths and portions of the site's code + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2023-6065 + - https://wpscan.com/vulnerability/64f2557f-c5e4-4779-9e28-911dfaf2dda5 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2023-6065 + epss-score: 0.00046 + epss-percentile: 0.16179 + cpe: cpe:2.3:a:quttera:quttera_web_malware_scanner:*:*:*:*:*:wordpress:*:* + metadata: + vendor: quttera + product: quttera_web_malware_scanner + framework: wordpress + tags: wpscan,cve2023,wp-plugin,quttera + +http: + - method: GET + path: + - "{{BaseURL}}/wp-content/plugins/quttera-web-malware-scanner/quttera_wp_report.txt" + + matchers-condition: and + matchers: + - type: word + words: + - "Website Malware Scan Report" + - "Scanned Website" + - "Scan type" + part: body + condition: and + + - type: status + status: + - 200 \ No newline at end of file