The Narnoo Distributor WordPress plugin through 2.5.1 fails to validate and sanitize the lib_path parameter before it is passed into a call to require() via the narnoo_distributor_lib_request AJAX action (available to both unauthenticated and authenticated users) which results in the disclosure of arbitrary files as the content of the file is then displayed in the response as JSON data. This could also lead to RCE with various tricks but depends on the underlying system and it's configuration.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 - Exploit, Third Party Advisory |
Information
Published : 2022-03-28 18:15
Updated : 2024-11-21 06:39
NVD link : CVE-2022-0679
Mitre link : CVE-2022-0679
CVE.ORG link : CVE-2022-0679
JSON object : View
Products Affected
narnoo_distributor_project
- narnoo_distributor
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')