Enhancement: cves/2022/CVE-2022-1386.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-04-06 17:41:10 -04:00
parent c3dab25d75
commit 5b7b47a801
1 changed files with 5 additions and 2 deletions

View File

@ -1,15 +1,16 @@
id: CVE-2022-1386
info:
name: WordPress Fusion Builder < 3.6.2 - Unauthenticated SSRF
name: WordPress Fusion Builder <3.6.2 - Server-Side Request Forgery
author: akincibor,MantisSTS,calumjelrick
severity: critical
description: |
The plugin, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.
WordPress Fusion Builder plugin before 3.6.2, used in the Avada theme, is susceptible to server-side request forgery. The plugin does not validate a parameter in its forms, which can be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. An attacker can potentially interact with hosts on the server's local network, bypass firewalls, and access control measures.
reference:
- https://wpscan.com/vulnerability/bf7034ab-24c4-461f-a709-3f73988b536b
- https://www.rootshellsecurity.net/rootshell-discovered-a-critical-vulnerability-in-top-wordpress-theme/
- https://theme-fusion.com/version-7-6-2-security-update/
- https://nvd.nist.gov/vuln/detail/CVE-2022-1386
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
@ -94,3 +95,5 @@ requests:
- type: status
status:
- 200
# Enhanced by md on 2023/04/06