Enhancement: cves/2022/CVE-2022-1119.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-06-29 13:52:36 -04:00
parent fcb77b06e1
commit 3b29dde528
1 changed files with 5 additions and 3 deletions

View File

@ -1,16 +1,16 @@
id: CVE-2022-1119
info:
name: WordPress Simple File List < 3.2.8 - Arbitrary File Retrieval
name: WordPress Simple File List <3.2.8 - Local File Inclusion
author: random-robbie
severity: high
description: |
The Wordpress plugin is vulnerable to arbitrary file retrieval via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which make it possible for unauthenticated attackers retrieve arbitrary files.
WordPress Simple File List before 3.2.8 is vulnerable to local file inclusion via the eeFile parameter in the ~/includes/ee-downloader.php due to missing controls which make it possible for unauthenticated attackers retrieve arbitrary files.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2022-1119
- https://wpscan.com/vulnerability/5551038f-64fb-44d8-bea0-d2f00f04877e
- https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606
- https://plugins.trac.wordpress.org/browser/simple-file-list/trunk/includes/ee-downloader.php?rev=2071880
- https://nvd.nist.gov/vuln/detail/CVE-2022-1119
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
@ -35,3 +35,5 @@ requests:
- type: status
status:
- 200
# Enhanced by mp on 2022/06/29