From d7a19ee52a18f93e085cba62432b2e118c4cd3fa Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 14 May 2024 18:07:52 +0530 Subject: [PATCH] minor update --- http/cves/2023/CVE-2023-5991.yaml | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/http/cves/2023/CVE-2023-5991.yaml b/http/cves/2023/CVE-2023-5991.yaml index 88a964407e..1f67bfe17d 100644 --- a/http/cves/2023/CVE-2023-5991.yaml +++ b/http/cves/2023/CVE-2023-5991.yaml @@ -6,6 +6,7 @@ info: severity: critical description: | The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server + remediation: Fixed in 4.8.5 reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-5991 - https://wpscan.com/vulnerability/e9d35e36-1e60-4483-b8b3-5cbf08fcd49e/ @@ -15,13 +16,16 @@ info: cve-id: CVE-2023-5991 cwe-id: CWE-22 epss-score: 0.00603 - epss-percentile: 0.78406 + epss-percentile: 0.78412 cpe: cpe:2.3:a:motopress:hotel_booking_lite:*:*:*:*:*:wordpress:*:* metadata: + verified: true + max-request: 1 vendor: motopress product: hotel_booking_lite framework: wordpress - tags: cve,cve2023,lfi,hbl,hotel + publicwww-query: "/wp-content/plugins/motopress-hotel-booking" + tags: cve,cve2023,lfi,motopress-hotel-booking,wordpress,wp-plugin,wpscan,wp http: - method: GET @@ -31,6 +35,7 @@ http: matchers-condition: and matchers: - type: regex + part: body regex: - "root:.*:0:0:"