CVE-2022-0679

The Narnoo Distributor WordPress plugin through 2.5.1 fails to validate and sanitize the lib_path parameter before it is passed into a call to require() via the narnoo_distributor_lib_request AJAX action (available to both unauthenticated and authenticated users) which results in the disclosure of arbitrary files as the content of the file is then displayed in the response as JSON data. This could also lead to RCE with various tricks but depends on the underlying system and it's configuration.
Configurations

Configuration 1 (hide)

cpe:2.3:a:narnoo_distributor_project:narnoo_distributor:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8 - Exploit, Third Party Advisory

Information

Published : 2022-03-28 18:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0679

Mitre link : CVE-2022-0679

CVE.ORG link : CVE-2022-0679


JSON object : View

Products Affected

narnoo_distributor_project

  • narnoo_distributor
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')