mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-30 10:10:35 +00:00
20 lines
1.0 KiB
Markdown
20 lines
1.0 KiB
Markdown
![]() |
### [CVE-2022-1390](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1390)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://packetstormsecurity.com/files/166476/
|
||
|
- https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/ARPSyndicate/kenzer-templates
|
||
|
|