cve/2022/CVE-2022-0687.md

18 lines
917 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0687](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0687)
![](https://img.shields.io/static/v1?label=Product&message=Amelia%20%E2%80%93%20Events%20%26%20Appointments%20Booking%20Calendar&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.0.47%3C%201.0.47%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen)
### Description
The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom "Amelia Manager" role.
### POC
#### Reference
- https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c
#### Github
No PoCs found on GitHub currently.