cve/2023/CVE-2023-4281.md

19 lines
828 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-4281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4281)
![](https://img.shields.io/static/v1?label=Product&message=Activity%20Log&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.8.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen)
### Description
This Activity Log WordPress plugin before 2.8.8 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.
### POC
#### Reference
2024-05-28 08:49:17 +00:00
- https://wpscan.com/vulnerability/f5ea6c8a-6b07-4263-a1be-dd033f078d49
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/b0marek/CVE-2023-4281
- https://github.com/nomi-sec/PoC-in-GitHub