Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-2340
HistoryMay 04, 2024 - 8:32 a.m.

Avada < 7.11.7 - Information Disclosure

2024-05-0408:32:49
ProjectDiscovery
github.com
56
wordpress
avada
information exposure
vulnerability
sensitive data

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

21.4%

The Avada theme for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.11.6 via the '/wp-content/uploads/fusion-forms/' directory. This makes it possible for unauthenticated attackers to extract sensitive data uploaded via an Avada created form with a file upload mechanism.
id: CVE-2024-2340

info:
  name: Avada < 7.11.7 - Information Disclosure
  author: t3l3machus
  severity: medium
  description: |
    The Avada theme for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.11.6 via the '/wp-content/uploads/fusion-forms/' directory. This makes it possible for unauthenticated attackers to extract sensitive data uploaded via an Avada created form with a file upload mechanism.
  remediation: Fixed in 7.11.7
  reference:
    - https://vulners.com/wpvulndb/WPVDB-ID:507E1D07-4953-4A31-81E8-80F01F971E2A
    - https://avada.com/documentation/avada-changelog/
    - https://www.wordfence.com/threat-intel/vulnerabilities/id/8db8bbc3-43ca-4ef5-a44d-2987c8597961?source=cve
    - https://nvd.nist.gov/vuln/detail/CVE-2024-2340
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2024-2340
    epss-score: 0.00053
    epss-percentile: 0.21091
  metadata:
    verified: true
    max-request: 1
  tags: cve,cve2024,wp-theme,wp,wordpress,wpscan,avada,exposure

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/uploads/fusion-forms/"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - '<title>Index of [\s\S]*title>'
          - 'fusion'
        condition: and

      - type: status
        status:
          - 200
# digest: 490a0046304402205ce1ac8b2838d3f39573c0dad38b90d092fc30429472656baf03db2659983c79022050f63a92a5a33033e109adbb6e973ac87138adb868fa226c73e064fb461a5424:922c64590222798bb761d5b6d8e72950

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.001

Percentile

21.4%