René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

114 lines
3.7 KiB
JSON

{
"id": "CVE-2022-0493",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-03-28T18:15:08.953",
"lastModified": "2022-04-04T20:26:44.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The String locator WordPress plugin before 2.5.0 does not properly validate the path of the files to be searched, allowing high privilege users such as admin to query arbitrary files on the web server via a path traversal vector. Furthermore, due to a flaw in the search, allowing a pattern to be provided, which will be used to output the relevant matches from the matching file, all content of the file can be disclosed."
},
{
"lang": "es",
"value": "El plugin String locator de WordPress versiones anteriores a 2.5.0, no comprueba correctamente la ruta de los archivos a buscar, permitiendo a usuarios con altos privilegios como el admin consultar archivos arbitrarios en el servidor web por medio de un vector de salto de ruta. Adem\u00e1s, debido a un fallo en la b\u00fasqueda, que permite proporcionar un patr\u00f3n, que ser\u00e1 usado para dar salida a las coincidencias relevantes del archivo coincidente, todo el contenido del archivo puede ser divulgado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:string_locator_project:string_locator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.5.0",
"matchCriteriaId": "8AFAB186-FE6D-4747-920D-2A904B2EF680"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2685592",
"source": "contact@wpscan.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/21e2e5fc-03d2-4791-beef-07af6bf985ed",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}