cve/2023/CVE-2023-3452.md

20 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3452](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3452)
![](https://img.shields.io/static/v1?label=Product&message=Canto&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%203.0.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20('PHP%20Remote%20File%20Inclusion')&color=brighgreen)
### Description
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
### POC
#### Reference
No PoCs from references.
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/0x1x02/Canto-RFI-RCE-Exploit
2024-05-25 21:48:12 +02:00
- https://github.com/leoanggal1/CVE-2023-3452-PoC
- https://github.com/nomi-sec/PoC-in-GitHub