WordPress WP Security Audit Log 3.1.1 - Information Disclosure
ID: CVE-2018-8719
Severity: medium
Author: LogicalHunter
Tags: cve,cve2018,exposure,edb,wordpress,wp-plugin,wpsecurityauditlog
Description
Section titled “Description”WordPress WP Security Audit Log 3.1.1 plugin is susceptible to information disclosure. Access to wp-content/uploads/wp-security-audit-log/* files is not restricted. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2018-8719
info: name: WordPress WP Security Audit Log 3.1.1 - Information Disclosure author: LogicalHunter severity: medium description: | WordPress WP Security Audit Log 3.1.1 plugin is susceptible to information disclosure. Access to wp-content/uploads/wp-security-audit-log/* files is not restricted. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | An attacker can exploit this vulnerability to gain sensitive information from the WordPress WP Security Audit Log plugin. remediation: | Update to the latest version of WordPress WP Security Audit Log plugin (3.1.2 or higher) to fix the information disclosure vulnerability. reference: - https://www.exploit-db.com/exploits/44371 - https://vuldb.com/?id.115817 - https://www.exploit-db.com/exploits/44371/ - https://nvd.nist.gov/vuln/detail/CVE-2018-8719 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2018-8719 cwe-id: CWE-532 epss-score: 0.03177 epss-percentile: 0.91151 cpe: cpe:2.3:a:wpsecurityauditlog:wp_security_audit_log:3.1.1:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: wpsecurityauditlog product: wp_security_audit_log framework: wordpress tags: cve,cve2018,exposure,edb,wordpress,wp-plugin,wpsecurityauditlog
http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/wp-security-audit-log/failed-logins/"
matchers-condition: and matchers: - type: word words: - "[TXT]" - ".log" - "Index of" condition: and
- type: status status: - 200# digest: 4a0a004730450220178ae6c45cb272de7c9801059746b38f8afd5ea31080554650e54f3ef0c24a6f022100da11d95d9fd5334f442e7f2d00b2ddebabd4451acc5d5fa1b74860f7514930ed:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-8719.yaml"