| [Japanese] | 
| JVNDB-2023-000067 | 
| WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal | 
|
| 
 
WordPress Plugin "Snow Monkey Forms" provided by Monkey Wrench Inc. contains a directory traversal vulnerability (CWE-22).
 Shinsaku Nomura of Bitforest Co.,Ltd. reported this vulnerability to IPA.
 JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 5.8 (Medium) [IPA Score]
 
    Attack Vector: NetworkAttack Complexity: LowPrivileges Required: NoneUser Interaction: NoneScope: ChangedConfidentiality Impact: NoneIntegrity Impact: LowAvailability Impact: None 
  CVSS V2 Severity:Base Metrics 5.0 (Medium) [IPA Score]
 
    Access Vector: NetworkAccess Complexity: LowAuthentication: NoneConfidentiality Impact: NoneIntegrity Impact: PartialAvailability Impact: None 
  This analysis assumes that an attacker removes a file outside the web contents area.
 | 
|
| 
 
	
 | 
| 
 
	Monkey Wrench
	
		Snow Monkey Forms v5.1.1 and earlier | 
| 
 
	[2023/07/14 Update]When this advisory was first published on 2023 June 27, the affected versions were described as "5.1.0 and earlier". However, it was found by the reporter that the fix was not adequate in version 5.1.1. Therefore, version 5.1.2 that contains the fix was released later.
 | 
|
| 
 
Arbitrary files on the server may be deleted by a remote attacker.
 | 
|
| 
 
[Update the plugin]Update the plugin according to the information provided by the developer.
 | 
|
| 
 
	Monkey Wrench
	
 | 
|
| 
 
	Path Traversal(CWE-22) [IPA Evaluation] | 
|
| 
 
	CVE-2023-32623  | 
|
| 
 
	JVN : JVN#97127032 National Vulnerability Database (NVD) : CVE-2023-32623  | 
|
| 
 
	[2023/06/27]Web page was published
[2023/07/14]Affected Products : Product version was modified
 Affected Products : Content was added
 Vendor Information : Content was modified
[2024/04/26]References : Content was added
 
 
 |