cvelist/2022/1xxx/CVE-2022-1273.json

75 lines
1.8 KiB
JSON
Raw Normal View History

2022-04-08 10:01:37 +00:00
{
2022-05-02 18:00:30 +02:00
"CVE_data_meta": {
"ID": "CVE-2022-1273",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Import WP < 2.4.6 - Admin+ Arbitrary File Upload to RCE"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Import WP Import and Export WordPress data to XML or CSV files",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "2.4.6",
"version_value": "2.4.6"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Import WP WordPress plugin before 2.4.6 does not validate the imported file in some cases, allowing high privilege users such as admin to upload arbitrary files (such as PHP), leading to RCE"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603",
"name": "https://wpscan.com/vulnerability/ad99b9ba-5f24-4682-a787-00f0e8e32603"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "eng"
}
2022-04-08 10:01:37 +00:00
]
2022-05-02 18:00:30 +02:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "ericfrank900528"
2022-04-08 10:01:37 +00:00
}
2022-05-02 18:00:30 +02:00
],
"source": {
"discovery": "EXTERNAL"
}
2022-04-08 10:01:37 +00:00
}