ID |
CVE-2022-1560
|
Sažetak |
The Amministrazione Aperta WordPress plugin before 3.8 does not validate the open parameter before using it in an include statement, leading to a Local File Inclusion issue. The original advisory mentions that unauthenticated users can exploit this, however the affected file generates a fatal error when accessed directly and the affected code is not reached. The issue can be exploited via the dashboard when logged in as an admin, or by making a logged in admin open a malicious link |
Reference |
|
CVSS |
Base: | 4.3 |
Impact: | 2.9 |
Exploitability: | 8.6 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
NONE |
NONE |
|
CVSS vektor |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
Zadnje važnije ažuriranje |
14-10-2022 - 02:26 |
Objavljeno |
16-05-2022 - 15:15 |