CVE-2022-0656

The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)
Configurations

Configuration 1 (hide)

cpe:2.3:a:webtoprint:web_to_print_shop\:udraw:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 - Exploit, Third Party Advisory

Information

Published : 2022-04-25 16:16

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0656

Mitre link : CVE-2022-0656

CVE.ORG link : CVE-2022-0656


JSON object : View

Products Affected

webtoprint

  • web_to_print_shop\
CWE
CWE-552

Files or Directories Accessible to External Parties