Enhancement: cves/2022/CVE-2022-1952.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-04-07 11:29:08 -04:00
parent 76256c7485
commit 6086965c61
1 changed files with 4 additions and 2 deletions

View File

@ -1,11 +1,11 @@
id: CVE-2022-1952 id: CVE-2022-1952
info: info:
name: eaSYNC < 1.1.16 - Unauthenticated Arbitrary File Upload name: WordPress eaSYNC Booking <1.1.16 - Arbitrary File Upload
author: theamanrawat author: theamanrawat
severity: critical severity: critical
description: | description: |
The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps. WordPress eaSync Booking plugin bundle for hotel, restaurant and car rental before 1.1.16 is susceptible to arbitrary file upload. The plugin contains insufficient input validation of an AJAX action. An allowlist of valid file extensions is defined but is not used during the validation steps. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
reference: reference:
- https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04 - https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04
- https://wordpress.org/plugins/easync-booking/ - https://wordpress.org/plugins/easync-booking/
@ -73,3 +73,5 @@ requests:
regex: regex:
- 'wp-content\\\/uploads\\\/([0-9a-zA-Z]+).php' - 'wp-content\\\/uploads\\\/([0-9a-zA-Z]+).php'
internal: true internal: true
# Enhanced by md on 2023/04/07