diff --git a/cves/2022/CVE-2022-1952.yaml b/cves/2022/CVE-2022-1952.yaml index 2124b7189e..f05a97abae 100644 --- a/cves/2022/CVE-2022-1952.yaml +++ b/cves/2022/CVE-2022-1952.yaml @@ -1,11 +1,11 @@ id: CVE-2022-1952 info: - name: eaSYNC < 1.1.16 - Unauthenticated Arbitrary File Upload + name: WordPress eaSYNC Booking <1.1.16 - Arbitrary File Upload author: theamanrawat severity: critical description: | - The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps. + WordPress eaSync Booking plugin bundle for hotel, restaurant and car rental before 1.1.16 is susceptible to arbitrary file upload. The plugin contains insufficient input validation of an AJAX action. An allowlist of valid file extensions is defined but is not used during the validation steps. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. reference: - https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 - https://wordpress.org/plugins/easync-booking/ @@ -73,3 +73,5 @@ requests: regex: - 'wp-content\\\/uploads\\\/([0-9a-zA-Z]+).php' internal: true + +# Enhanced by md on 2023/04/07