2021-01-02 04:59:06 +00:00
id : CVE-2019-15858
2020-12-15 01:53:39 +00:00
info :
2022-06-14 15:10:31 +00:00
name : WordPress Woody Ad Snippets <2.2.5 - Cross-Site Scripting/Remote Code Execution
2021-06-09 12:20:56 +00:00
author : dwisiswant0,fmunozs,patralos
2020-12-15 01:53:39 +00:00
severity : high
description : |
2022-06-14 15:10:31 +00:00
WordPress Woody Ad Snippets prior to 2.2.5 is susceptible to cross-site scripting and remote code execution via admin/includes/class.import.snippet.php, which allows unauthenticated options import as demonstrated by storing a cross-site scripting payload for remote code execution.
2022-04-22 10:38:41 +00:00
reference :
- https://github.com/GeneralEG/CVE-2019-15858
2022-05-17 09:18:12 +00:00
- https://blog.nintechnet.com/multiple-vulnerabilities-in-wordpress-woody-ad-snippets-plugin-lead-to-remote-code-execution/
- https://wpvulndb.com/vulnerabilities/9490
2022-06-14 15:10:31 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2019-15858
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 8.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2019-15858
cwe-id : CWE-306
2022-06-20 17:29:35 +00:00
tags : cve,cve2019,wordpress,wp-plugin,xss,wp
2020-12-15 01:53:39 +00:00
requests :
- method : GET
path :
- "{{BaseURL}}/wp-content/plugins/insert-php/readme.txt"
matchers-condition : and
matchers :
- type : word
2022-06-20 17:29:35 +00:00
part : body
2020-12-15 01:53:39 +00:00
words :
- "2.2.5"
negative : true
- type : word
2022-06-20 17:29:35 +00:00
part : body
2020-12-15 01:53:39 +00:00
words :
- "Changelog"
- type : word
2022-06-20 17:29:35 +00:00
part : body
2020-12-15 01:53:39 +00:00
words :
- "Woody ad snippets"
2022-06-14 15:10:31 +00:00
2022-06-20 17:29:35 +00:00
- type : status
status :
- 200
2022-06-14 15:10:31 +00:00
# Enhanced by mp on 2022/06/14