54 lines
1.8 KiB
YAML
54 lines
1.8 KiB
YAML
id: CVE-2024-1209
|
|
|
|
info:
|
|
name: LearnDash LMS < 4.10.2 - Sensitive Information Exposure via assignments
|
|
author: ritikchaddha
|
|
severity: medium
|
|
description: |
|
|
The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.1 via direct file access due to insufficient protection of uploaded assignments. This makes it possible for unauthenticated attackers to obtain those uploads.
|
|
remediation: Fixed in 4.10.2
|
|
reference:
|
|
- https://wpscan.com/vulnerability/f813a21d-7a6a-4ff4-a43c-3e2991a23c7f/
|
|
- https://github.com/karlemilnikka/CVE-2024-1209
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-1209
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2024-1209
|
|
cpe: cpe:2.3:a:learndash:learndash:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: learndash
|
|
product: learndash
|
|
framework: wordpress
|
|
publicwww-query: "/wp-content/plugins/sfwd-lms"
|
|
googledork-query: inurl:"/wp-content/plugins/sfwd-lms"
|
|
tags: wpscan,cve,cve2024,wp,wp-plugin,wordpress,exposure,learndash
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/wp-json/wp/v2/sfwd-assignment"
|
|
|
|
host-redirects: true
|
|
max-redirects: 2
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- '"id":'
|
|
- 'slug":"assignment'
|
|
- '.pdf"'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- 'application/json'
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a00473045022100f2b85111f838308bcd9df9dab813d0fc0d2b9c5117a99e669dcf4a23ae00adbe022042c076031f9a7a04497108f546bf26c236e51dccd79656f1f0fbfcffe31a5ec0:922c64590222798bb761d5b6d8e72950 |