Update CVE-2020-12800.yaml

patch-1
Prince Chaddha 2022-05-17 11:59:52 +05:30 committed by GitHub
parent 50bdba06b1
commit 0154c517ac
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 6 deletions

View File

@ -4,7 +4,8 @@ info:
name: WordPress Contact Form 7 <1.3.3.3 - Remote Code Execution
author: dwisiswant0
severity: critical
description: WordPress Contact Form 7 before 1.3.3.3 allows unrestricted file upload and remote code execution by setting supported_type to php% and uploading a .php% file.
description: |
WordPress Contact Form 7 before 1.3.3.3 allows unrestricted file upload and remote code execution by setting supported_type to php% and uploading a .php% file.
reference:
- https://wordpress.org/plugins/drag-and-drop-multiple-file-upload-contact-form-7/#developers
- https://nvd.nist.gov/vuln/detail/CVE-2020-12800
@ -13,7 +14,7 @@ info:
cvss-score: 9.8
cve-id: CVE-2020-12800
cwe-id: CWE-434
tags: cve,cve2020,wordpress,wp-plugin,upload
tags: cve,cve2020,wordpress,wp-plugin,fileupload,wp,rce
requests:
- raw:
@ -53,13 +54,12 @@ requests:
req-condition: true
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body_2
words:
- "CVE-2020-12800-{{randstr}}"
- type: status
status:
- 200
# Enhanced by mp on 2022/05/16