Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9vf6-r8jp-w3m7

Опубликовано: 29 мар. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.3

Описание

The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data

The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data

EPSS

Процентиль: 38%
0.00166
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352
CWE-862

Связанные уязвимости

CVSS3: 4.3
nvd
почти 4 года назад

The Church Admin WordPress plugin before 3.4.135 does not have authorisation and CSRF in some of its action as well as requested files, allowing unauthenticated attackers to repeatedly request the "refresh-backup" action, and simultaneously keep requesting a publicly accessible temporary file generated by the plugin in order to disclose the final backup filename, which can then be fetched by the attacker to download the backup of the plugin's DB data

EPSS

Процентиль: 38%
0.00166
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-352
CWE-862