Merge pull request #5299 from LRTK-CODER/CVE-2022-2551

Create CVE-2022-2551.yaml
patch-1
Prince Chaddha 2022-09-28 13:45:12 +05:30 committed by GitHub
commit ca52955014
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 45 additions and 0 deletions

View File

@ -0,0 +1,45 @@
id: CVE-2022-2551
info:
name: Duplicator < 1.4.7 - Unauthenticated Backup Download
author: LRTK-CODER
severity: high
description: |
The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating.
remediation: Fixed in version 1.4.7.1
reference:
- https://wpscan.com/vulnerability/f27d753e-861a-4d8d-9b9a-6c99a8a7ebe0
- https://wordpress.org/plugins/duplicator/
- https://nvd.nist.gov/vuln/detail/CVE-2022-2551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2551
- https://github.com/SecuriTrust/CVEsLab/tree/main/CVE-2022-2551
classification:
cve-id: CVE-2022-2551
cwe-id: CWE-284
metadata:
verified: true
google-query: inurl:/backups-dup-lite/dup-installer/
tags: cve,cve2022,wordpress,wp,wp-plugin,duplicator
requests:
- method: GET
path:
- "{{BaseURL}}/wp-content/backups-dup-lite/dup-installer/main.installer.php?is_daws=1"
- "{{BaseURL}}/wp-content/dup-installer/main.installer.php?is_daws=1"
matchers-condition: and
matchers:
- condition: and
type: word
part: body
words:
- "<a href='../installer.php'>restart this install process</a>"
- type: word
part: header
words:
- text/html
- type: status
status:
- 200