cve/2022/CVE-2022-0828.md

18 lines
919 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-0828](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0828)
![](https://img.shields.io/static/v1?label=Product&message=Download%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%203.2.34%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)&color=brighgreen)
### Description
The Download Manager WordPress plugin before 3.2.34 uses the uniqid php function to generate the master key for a download, allowing an attacker to brute force the key with reasonable resources giving direct download access regardless of role based restrictions or password protections set for the download.
### POC
#### Reference
- https://wpscan.com/vulnerability/7f0742ad-6fd7-4258-9e44-d42e138789bb
#### Github
- https://github.com/ARPSyndicate/cvemon