cve/2023/CVE-2023-4139.md

18 lines
903 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-4139](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4139)
![](https://img.shields.io/static/v1?label=Product&message=Import%20All%20Pages%2C%20Post%20types%2C%20Products%2C%20Orders%2C%20and%20Users%20as%20XML%20%26%20CSV&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%207.9.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brighgreen)
### Description
The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Sensitive Information Exposure via Directory Listing due to missing restriction in export folder indexing in versions up to, and including, 7.9.8. This makes it possible for unauthenticated attackers to list and view exported files.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds