A vulnerability, which was classified as critical, was found in WoWonder. Affected is the file /requests.php which is responsible to handle group messages. The manipulation of the argument group_id allows posting messages in other groups. It is possible to launch the attack remotely but it might require authentication. A video explaining the attack has been disclosed to the public.
References
Link | Resource |
---|---|
https://vuldb.com/?id.199974 | Permissions Required Third Party Advisory |
https://www.youtube.com/watch?v=tIzOZtp2fxA | Exploit Third Party Advisory |
https://youtu.be/tIzOZtp2fxA | Exploit Third Party Advisory |
https://vuldb.com/?id.199974 | Permissions Required Third Party Advisory |
https://www.youtube.com/watch?v=tIzOZtp2fxA | Exploit Third Party Advisory |
https://youtu.be/tIzOZtp2fxA | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 5.4 |
References | () https://vuldb.com/?id.199974 - Permissions Required, Third Party Advisory | |
References | () https://www.youtube.com/watch?v=tIzOZtp2fxA - Exploit, Third Party Advisory | |
References | () https://youtu.be/tIzOZtp2fxA - Exploit, Third Party Advisory |
Information
Published : 2022-05-17 06:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1753
Mitre link : CVE-2022-1753
CVE.ORG link : CVE-2022-1753
JSON object : View
Products Affected
wowonder
- wowonder