5.3
CVE-2022-4023
- EPSS 0.08%
- Veröffentlicht 17.07.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:34:27
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
3DPrint <= 3.5.6.8 - Cross-Site Request Forgery to Arbitrary File Download
The 3DPrint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious request that will create an archive of any files or directories on the target server by tricking a logged in admin into submitting a form. Furthermore the created archive has a predictable location and name, allowing the attacker to download the file if they know the time at which the form was submitted, making it possible to leak sensitive files like the WordPress configuration containing database credentials and secrets.
Mögliche Gegenmaßnahme
3DPrint: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
3DPrint
Version
* - 3.5.6.9
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
3dprint Project ≫ 3dprint SwPlatformwordpress Version < 3.5.6.9
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.233 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
|