2024-12-15 03:03:56 +00:00

115 lines
4.0 KiB
JSON

{
"id": "CVE-2022-0403",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-04-04T16:15:09.043",
"lastModified": "2024-11-21T06:38:33.170",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Library File Manager WordPress plugin before 5.2.3 is using an outdated version of the elFinder library, which is know to be affected by security issues (CVE-2021-32682), and does not have any authorisation as well as CSRF checks in its connector AJAX action, allowing any authenticated users, such as subscriber to call it. Furthermore, as the options passed to the elFinder library does not restrict any file type, users with a role as low as subscriber can Create/Upload/Delete Arbitrary files and folders."
},
{
"lang": "es",
"value": "El plugin Library File Manager de WordPress versiones anteriores a 5.2.3, usa una versi\u00f3n obsoleta de la biblioteca elFinder, que es sabido que est\u00e1 afectada por problemas de seguridad (CVE-2021-32682), y no presenta ning\u00fan tipo de autorizaci\u00f3n as\u00ed como comprobaciones de tipo CSRF en su acci\u00f3n AJAX del conector, permitiendo que cualquier usuario autenticado, como el suscriptor, pueda llamarla. Adem\u00e1s, como las opciones pasadas a la librer\u00eda elFinder no restringen ning\u00fan tipo de archivo, los usuarios con un rol tan bajo como el de suscriptor pueden Crear/Subir/Borrar archivos y carpetas arbitrarias"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"baseScore": 5.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpjos:library_file_manager:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.2.3",
"matchCriteriaId": "34794276-DFB3-4903-B754-E8263FE2654B"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}