Update CVE-2018-7422.yaml

patch-1
Prince Chaddha 2022-06-20 21:50:16 +05:30 committed by GitHub
parent e14e52c4c4
commit c6503a105a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 3 deletions

View File

@ -4,7 +4,8 @@ info:
name: WordPress Site Editor <=1.1.1 - Local File Inclusion
author: LuskaBol,0x240x23elu
severity: high
description: WordPress Site Editor through 1.1.1 allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php.
description: |
WordPress Site Editor through 1.1.1 allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php.
reference:
- https://www.exploit-db.com/exploits/44340
- http://seclists.org/fulldisclosure/2018/Mar/40
@ -26,15 +27,15 @@ requests:
matchers-condition: or
matchers:
- type: word
part: body
words:
- "DB_NAME"
- "DB_PASSWORD"
part: body
condition: and
- type: regex
part: body
regex:
- "root:.*:0:0:"
part: body
# Enhanced by mp on 2022/06/17