cve/2022/CVE-2022-0656.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0656)
![](https://img.shields.io/static/v1?label=Product&message=Web%20To%20Print%20Shop%20%3A%20uDraw&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.3.3%3C%203.3.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen)
### Description
The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)
### POC
#### Reference
- https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/cyllective/CVEs