The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/166476/ | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/166476/ | Exploit Third Party Advisory VDB Entry |
https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/166476/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990 - Exploit, Third Party Advisory |
Information
Published : 2022-04-25 16:16
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1390
Mitre link : CVE-2022-1390
CVE.ORG link : CVE-2022-1390
JSON object : View
Products Affected
admin_word_count_column_project
- admin_word_count_column
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')