cvelist/2022/4xxx/CVE-2022-4109.json

79 lines
2.4 KiB
JSON
Raw Normal View History

2022-11-21 23:00:36 +00:00
{
2023-01-02 22:00:37 +00:00
"data_version": "4.0",
2022-11-21 23:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-4109",
2023-01-02 22:00:37 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2022-11-21 23:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-01-02 22:00:37 +00:00
"value": "The Wholesale Market for WooCommerce WordPress plugin before 2.0.0 does not validate user input against path traversal attacks, allowing high privilege users such as admin to download arbitrary logs from the server even when they should not be able to (for example in multisite)"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Wholesale Market for WooCommerce",
"version": {
"version_data": [
{
"version_value": "0",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670"
2022-11-21 23:00:36 +00:00
}
]
2023-01-02 22:00:37 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
2023-01-10 10:00:40 +00:00
{
"lang": "en",
"value": "WPScan"
},
2023-01-02 22:00:37 +00:00
{
"lang": "en",
"value": "WPScan"
}
]
2022-11-21 23:00:36 +00:00
}