Enhancement: cves/2022/CVE-2022-1952.yaml by md
parent
76256c7485
commit
6086965c61
|
@ -1,11 +1,11 @@
|
||||||
id: CVE-2022-1952
|
id: CVE-2022-1952
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: eaSYNC < 1.1.16 - Unauthenticated Arbitrary File Upload
|
name: WordPress eaSYNC Booking <1.1.16 - Arbitrary File Upload
|
||||||
author: theamanrawat
|
author: theamanrawat
|
||||||
severity: critical
|
severity: critical
|
||||||
description: |
|
description: |
|
||||||
The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps.
|
WordPress eaSync Booking plugin bundle for hotel, restaurant and car rental before 1.1.16 is susceptible to arbitrary file upload. The plugin contains insufficient input validation of an AJAX action. An allowlist of valid file extensions is defined but is not used during the validation steps. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
|
||||||
reference:
|
reference:
|
||||||
- https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04
|
- https://wpscan.com/vulnerability/ecf61d17-8b07-4cb6-93a8-64c2c4fbbe04
|
||||||
- https://wordpress.org/plugins/easync-booking/
|
- https://wordpress.org/plugins/easync-booking/
|
||||||
|
@ -73,3 +73,5 @@ requests:
|
||||||
regex:
|
regex:
|
||||||
- 'wp-content\\\/uploads\\\/([0-9a-zA-Z]+).php'
|
- 'wp-content\\\/uploads\\\/([0-9a-zA-Z]+).php'
|
||||||
internal: true
|
internal: true
|
||||||
|
|
||||||
|
# Enhanced by md on 2023/04/07
|
||||||
|
|
Loading…
Reference in New Issue