The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 - Exploit, Third Party Advisory |
Information
Published : 2022-04-25 16:16
Updated : 2024-11-21 06:39
NVD link : CVE-2022-0656
Mitre link : CVE-2022-0656
CVE.ORG link : CVE-2022-0656
JSON object : View
Products Affected
webtoprint
- web_to_print_shop\
CWE
CWE-552
Files or Directories Accessible to External Parties