cve/2023/CVE-2023-4836.md

19 lines
957 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-4836](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4836)
![](https://img.shields.io/static/v1?label=Product&message=WordPress%20File%20Sharing%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.0.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen)
### Description
The WordPress File Sharing Plugin WordPress plugin before 2.0.5 does not check authorization before displaying files and folders, allowing users to gain access to those filed by manipulating IDs which can easily be brute forced
### POC
#### Reference
- https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc
2024-05-28 08:49:17 +00:00
- https://wpscan.com/vulnerability/c17f2534-d791-4fe3-b45b-875777585dc6
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.