[Japanese]
|
JVNDB-2023-000067
|
WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal
|
WordPress Plugin "Snow Monkey Forms" provided by Monkey Wrench Inc. contains a directory traversal vulnerability (CWE-22).
Shinsaku Nomura of Bitforest Co.,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 5.8 (Medium) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
CVSS V2 Severity: Base Metrics 5.0 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: None
- Integrity Impact: Partial
- Availability Impact: None
This analysis assumes that an attacker removes a file outside the web contents area.
|
|
Monkey Wrench
- Snow Monkey Forms v5.1.1 and earlier
|
[2023/07/14 Update]
When this advisory was first published on 2023 June 27, the affected versions were described as "5.1.0 and earlier". However, it was found by the reporter that the fix was not adequate in version 5.1.1. Therefore, version 5.1.2 that contains the fix was released later.
|
Arbitrary files on the server may be deleted by a remote attacker.
|
[Update the plugin]
Update the plugin according to the information provided by the developer.
|
Monkey Wrench
|
- Path Traversal(CWE-22) [IPA Evaluation]
|
- CVE-2023-32623
|
- JVN : JVN#97127032
- National Vulnerability Database (NVD) : CVE-2023-32623
|
- [2023/06/27]
Web page was published
- [2023/07/14]
Affected Products : Product version was modified
Affected Products : Content was added
Vendor Information : Content was modified
- [2024/04/26]
References : Content was added
|