Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-0537

Опубликовано: 04 апр. 2022
Источник: nvd
CVSS3: 7.2
CVSS2: 6.5
EPSS Низкий

Описание

The MapPress Maps for WordPress plugin before 2.73.13 allows a high privileged user to bypass the DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS settings and upload arbitrary files to the site through the "ajax_save" function. The file is written relative to the current 's stylesheet directory, and a .php file extension is added. No validation is performed on the content of the file, triggering an RCE vulnerability by uploading a web shell. Further the name parameter is not sanitized, allowing the payload to be uploaded to any directory to which the server has write access.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:*
Версия до 2.73.13 (исключая)

EPSS

Процентиль: 75%
0.00875
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 7.2
github
почти 4 года назад

The MapPress Maps for WordPress plugin before 2.73.13 allows a high privileged user to bypass the DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS settings and upload arbitrary files to the site through the "ajax_save" function. The file is written relative to the current 's stylesheet directory, and a .php file extension is added. No validation is performed on the content of the file, triggering an RCE vulnerability by uploading a web shell. Further the name parameter is not sanitized, allowing the payload to be uploaded to any directory to which the server has write access.

EPSS

Процентиль: 75%
0.00875
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-434