WordPress Ninja Job Board < 1.3.3 - Direct Request
ID: CVE-2022-2544
Severity: high
Author: tess
Tags: cve2022,cve,ninja,exposure,wpscan,wordpress,wp-plugin,wp,wpmanageninja
Description
Section titled “Description”WordPress Ninja Job Board plugin prior to 1.3.3 is susceptible to a direct request vulnerability. The plugin does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated directory listing which allows the download of uploaded resumes.
YAML Source
Section titled “YAML Source”id: CVE-2022-2544
info: name: WordPress Ninja Job Board < 1.3.3 - Direct Request author: tess severity: high description: WordPress Ninja Job Board plugin prior to 1.3.3 is susceptible to a direct request vulnerability. The plugin does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated directory listing which allows the download of uploaded resumes. impact: | An attacker can access sensitive files and potentially obtain sensitive information from the target system. remediation: | Update to the latest version of the WordPress Ninja Job Board plugin (1.3.3) to fix the vulnerability. reference: - https://plugins.trac.wordpress.org/changeset/2758420/ninja-job-board/trunk/includes/Classes/File/FileHandler.php?old=2126467&old_path=ninja-job-board%2Ftrunk%2Fincludes%2FClasses%2FFile%2FFileHandler.php - https://wpscan.com/vulnerability/a9bcc68c-eeda-4647-8463-e7e136733053 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2544 - https://nvd.nist.gov/vuln/detail/CVE-2022-2544 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-2544 cwe-id: CWE-425 epss-score: 0.00551 epss-percentile: 0.7513 cpe: cpe:2.3:a:wpmanageninja:ninja_job_board:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: wpmanageninja product: ninja_job_board framework: wordpress tags: cve2022,cve,ninja,exposure,wpscan,wordpress,wp-plugin,wp,wpmanageninja
http: - method: GET path: - "{{BaseURL}}/wp/wp-content/uploads/wpjobboard/" - "{{BaseURL}}/wp-content/uploads/wpjobboard/"
stop-at-first-match: true
matchers-condition: and matchers: - type: word part: body words: - "Index of /wp/wp-content/uploads/wpjobboard" - "Index of /wp-content/uploads/wpjobboard"
- type: word part: header words: - "text/html"
- type: status status: - 200# digest: 4a0a00473045022070e5ba83a3856e9b843045a0c8664f7b4310795c89175294d2b33bc36a5bbe5f022100c4597bb74170c7e3628b2d8062e0433d662bd7c7ada89cbb6504b0fd02212595:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-2544.yaml"