2023-10-31 15:00:22 +00:00
{
"id" : "CVE-2023-4836" ,
"sourceIdentifier" : "contact@wpscan.com" ,
"published" : "2023-10-31T14:15:12.160" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:36:04.500" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-10-31 15:00:22 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The WordPress File Sharing Plugin WordPress plugin before 2.0.5 does not check authorization before displaying files and folders, allowing users to gain access to those filed by manipulating IDs which can easily be brute forced"
2023-11-07 21:03:21 +00:00
} ,
2023-10-31 15:00:22 +00:00
{
2023-11-07 21:03:21 +00:00
"lang" : "es" ,
"value" : "El complemento WordPress File Sharing Plugin de WordPress anterior a 2.0.5 no verifica la autorizaci\u00f3n antes de mostrar archivos y carpetas, lo que permite a los usuarios obtener acceso a los archivados manipulando ID que pueden ser f\u00e1cilmente forzados."
2023-10-31 15:00:22 +00:00
}
] ,
2023-11-08 19:00:23 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.3 ,
"baseSeverity" : "MEDIUM" ,
2023-11-08 19:00:23 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-11-08 19:00:23 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-639"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:userprivatefiles:wordpress_file_sharing_plugin:*:*:*:*:*:wordpress:*:*" ,
"versionEndExcluding" : "2.0.5" ,
"matchCriteriaId" : "49FC51E7-C463-4DD0-918A-8660105FFF12"
}
]
}
]
}
] ,
2023-10-31 15:00:22 +00:00
"references" : [
{
"url" : "https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc" ,
2023-11-08 19:00:23 +00:00
"source" : "contact@wpscan.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-10-31 15:00:22 +00:00
} ,
{
"url" : "https://wpscan.com/vulnerability/c17f2534-d791-4fe3-b45b-875777585dc6" ,
2023-11-08 19:00:23 +00:00
"source" : "contact@wpscan.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://research.cleantalk.org/cve-2023-4836-user-private-files-idor-to-sensitive-data-and-private-files-exposure-leak-of-info-poc" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://wpscan.com/vulnerability/c17f2534-d791-4fe3-b45b-875777585dc6" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-10-31 15:00:22 +00:00
}
]
}