Vulnerability Details : CVE-2023-6114
Public exploit exists!
The Duplicator WordPress plugin before 1.5.7.1, Duplicator Pro WordPress plugin before 4.5.14.2 does not disallow listing the `backups-dup-lite/tmp` directory (or the `backups-dup-pro/tmp` directory in the Pro version), which temporarily stores files containing sensitive data. When directory listing is enabled in the web server, this allows unauthenticated attackers to discover and access these sensitive files, which include a full database dump and a zip archive of the site.
Products affected by CVE-2023-6114
- cpe:2.3:a:awesomemotive:duplicator:*:*:*:*:pro:wordpress:*:*
- cpe:2.3:a:awesomemotive:duplicator:*:*:*:*:-:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6114
60.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6114
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | 2024-01-05 |
CWE ids for CVE-2023-6114
-
The product makes files or directories accessible to unauthorized actors, even though they should not be.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-6114
-
https://wpscan.com/vulnerability/5c5d41b9-1463-4a9b-862f-e9ee600ef8e1
Just a moment...Exploit;Third Party Advisory
-
https://drive.google.com/file/d/1mpapFCqfZLv__EAM7uivrrl2h55rpi1V/view?usp=sharing
POC+Exploit Directory Listing to Account Takeover and Sensitive Data.mov - Google DriveExploit
Jump to