cve/2023/CVE-2023-2249.md
2024-05-25 21:48:12 +02:00

19 lines
1.2 KiB
Markdown

### [CVE-2023-2249](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2249)
![](https://img.shields.io/static/v1?label=Product&message=wpForo%20Forum&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%202.1.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20('PHP%20Remote%20File%20Inclusion')&color=brighgreen)
### Description
The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure use of file_get_contents without appropriate verification of the data being supplied to the function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to retrieve the contents of files like wp-config.php hosted on the system, perform a deserialization attack and possibly achieve remote code execution, and make requests to internal services.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ixiacom/CVE-2023-2249
- https://github.com/nomi-sec/PoC-in-GitHub