CVE-2023-6505 Scanner

CVE-2023-6505 Scanner - Information Disclosure vulnerability in Prime Mover

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 week 15 hours

Scan only one

URL

Toolbox

-

Prime Mover is a plugin used in WordPress environments, developed by Codexonics. This plugin facilitates the migration, backup, and restoration of WordPress sites. Widely used by developers and administrators, it helps in transferring sites between different servers or installations with ease. The plugin supports multisite and single-site configurations, catering to a variety of WordPress workflows. It is popular due to its user-friendly interface and powerful features that streamline site management tasks. The primary goal of this plugin is to simplify the WordPress migration process while maintaining data integrity.

The vulnerability in Prime Mover involves the exposure of sensitive data. This Information Disclosure vulnerability occurs due to improper restriction on directory listing in the plugin’s export folder. Unauthorized users can access sensitive information without authentication, putting site configuration, directories, files, and password hashes at risk. Affected versions are those prior to 1.9.3, where the issue has been fixed. This flaw poses a significant security risk as it could lead to unauthorized access and potential exploitation by malicious actors. Given the high API access nature of Prime Mover, this vulnerability needs immediate attention.

The technical details of the vulnerability reveal sensitive data exposure via directory listing in the 'prime-mover-export-files/1/' folder of the WordPress installation using Prime Mover. The vulnerability allows unauthenticated attackers to view files and directories, along with configuration data. The vulnerability presents itself in HTTP GET requests to the specific path, bypassing standard authentication mechanisms. This flaw points towards inadequate access controls over sensitive directories, leading to unintended data exposure. Correcting this involves configuring the server to restrict directory listings or applying updates that address the exposure.

If exploited, this vulnerability could leave sites open to unauthorized data access, potentially leading to data theft, site compromise, or other malicious activities. Attackers could extract site configurations, gain insights into protected information, and possibly use these details for further attacks. The exposed data could allow adversaries to gather information on system architecture and security defenses, increasing the risk of targeted attacks. Ultimately, this vulnerability undermines the confidentiality and integrity of WordPress installations utilizing Prime Mover.

REFERENCES

Get started to protecting your Free Full Security Scan