.. / CVE-2023-3219

Exploit for EventON Lite < 2.1.2 - Arbitrary File Download (CVE-2023-3219)

Description:

The plugin does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.

Nuclei Template

View the template here CVE-2023-3219.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-3219.yaml
Copy

References:

https://wordpress.org/plugins/eventon-lite/
https://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3219
http://packetstormsecurity.com/files/173992/WordPress-EventON-Calendar-4.4-Insecure-Direct-Object-Reference.html
https://wpscan.com/vulnerability/72d80887-0270-4987-9739-95b1a178c1fd