{ "id": "CVE-2023-6160", "sourceIdentifier": "security@wordfence.com", "published": "2023-11-22T16:15:15.810", "lastModified": "2023-11-29T18:58:52.620", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The LifterLMS \u2013 WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 7.4.2 via the maybe_serve_export function. This makes it possible for authenticated attackers, with administrator or LMS manager access and above, to read the contents of arbitrary CSV files on the server, which can contain sensitive information as well as removing those files from the server." }, { "lang": "es", "value": "El complemento LifterLMS \u2013 WordPress LMS Plugin para eLearning para WordPress es vulnerable a Directory Traversal en versiones hasta la 7.4.2 incluida a trav\u00e9s de la funci\u00f3n Maybe_serve_export. Esto hace posible que atacantes autenticados, con acceso de administrador o administrador LMS y superior, lean el contenido de archivos CSV arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial, adem\u00e1s de eliminar esos archivos del servidor." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.2, "impactScore": 5.5 }, { "source": "security@wordfence.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW" }, "exploitabilityScore": 0.7, "impactScore": 2.5 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:lifterlms:lifterlms:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "7.4.2", "matchCriteriaId": "DA640B5C-2E10-4409-8D4B-966EF9155497" } ] } ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/2989461/", "source": "security@wordfence.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d0fcd82-6d4a-454f-8056-a896e8d41d00?source=cve", "source": "security@wordfence.com", "tags": [ "Third Party Advisory" ] } ] }