[Japanese]

JVNDB-2023-000067

WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal

Overview

WordPress Plugin "Snow Monkey Forms" provided by Monkey Wrench Inc. contains a directory traversal vulnerability (CWE-22).

Shinsaku Nomura of Bitforest Co.,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.8 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Changed
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 5.0 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
This analysis assumes that an attacker removes a file outside the web contents area.
Affected Products


Monkey Wrench
  • Snow Monkey Forms v5.1.1 and earlier

[2023/07/14 Update]
When this advisory was first published on 2023 June 27, the affected versions were described as "5.1.0 and earlier". However, it was found by the reporter that the fix was not adequate in version 5.1.1. Therefore, version 5.1.2 that contains the fix was released later.
Impact

Arbitrary files on the server may be deleted by a remote attacker.
Solution

[Update the plugin]
Update the plugin according to the information provided by the developer.
Vendor Information

Monkey Wrench
CWE (What is CWE?)

  1. Path Traversal(CWE-22) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2023-32623
References

  1. JVN : JVN#97127032
  2. National Vulnerability Database (NVD) : CVE-2023-32623
Revision History

  • [2023/06/27]
      Web page was published
  • [2023/07/14]
      Affected Products : Product version was modified
      Affected Products : Content was added
      Vendor Information : Content was modified
  • [2024/04/26]
      References : Content was added