cve/2023/CVE-2023-1597.md

19 lines
1019 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1597)
![](https://img.shields.io/static/v1?label=Product&message=tagDiv%20Cloud%20Library&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-269%20Improper%20Privilege%20Management&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog.
### POC
#### Reference
2024-05-28 08:49:17 +00:00
- https://wpscan.com/vulnerability/4eafe111-8874-4560-83ff-394abe7a803b
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/truocphan/VulnBox