mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
19 lines
1000 B
Markdown
19 lines
1000 B
Markdown
![]() |
### [CVE-2022-0779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0779)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
The User Meta WordPress plugin before 2.4.4 does not validate the filepath parameter of its um_show_uploaded_file AJAX action, which could allow low privileged users such as subscriber to enumerate the local files on the web server via path traversal payloads
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cd
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/MrTuxracer/advisories
|
||
|
|