cve/2023/CVE-2023-2180.md

18 lines
901 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-2180](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2180)
![](https://img.shields.io/static/v1?label=Product&message=KIWIZ%20Invoices%20Certification%20%26%20PDF%20System&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen)
### Description
The KIWIZ Invoices Certification & PDF System WordPress plugin through 2.1.3 does not validate the path of files to be downloaded, which could allow unauthenticated attacker to read/downlaod arbitrary files, as well as perform PHAR unserialization (assuming they can upload a file on the server)
### POC
#### Reference
- https://wpscan.com/vulnerability/4d3b90d8-8a6d-4b72-8bc7-21f861259a1b
#### Github
No PoCs found on GitHub currently.