6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
0.001 Low
EPSS
Percentile
34.3%
The WordPress plugin
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:atlas_gondal:export_all_urls";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.126487");
script_version("2023-10-13T16:09:03+0000");
script_tag(name:"last_modification", value:"2023-10-13 16:09:03 +0000 (Fri, 13 Oct 2023)");
script_tag(name:"creation_date", value:"2023-09-15 11:20:45 +0000 (Fri, 15 Sep 2023)");
script_tag(name:"cvss_base", value:"7.7");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:M/C:N/I:C/A:C");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2022-09-01 20:52:00 +0000 (Thu, 01 Sep 2022)");
script_cve_id("CVE-2022-2638");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("WordPress Export All URLs Plugin < 4.4 Arbitrary File Deletion Vulnerability");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Web application abuses");
script_dependencies("gb_wordpress_plugin_http_detect.nasl");
script_mandatory_keys("wordpress/plugin/export-all-urls/detected");
script_tag(name:"summary", value:"The WordPress plugin 'Export All URLs' is prone to an
arbitrary file deletion vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The plugin does not validate the path of the file to be removed
on the system which is supposed to be the CSV file. This could allow high privilege users to
delete arbitrary file from the server.");
script_tag(name:"affected", value:"WordPress Export All URLs prior to version 4.4.");
script_tag(name:"solution", value:"Update to version 4.4 or later.");
script_xref(name:"URL", value:"https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/export-all-urls/export-all-urls-43-arbitrary-file-deletion");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if( ! port = get_app_port( cpe: CPE ) )
exit( 0 );
if( ! infos = get_app_version_and_location( cpe: CPE, port: port, exit_no_version: TRUE ) )
exit( 0 );
version = infos["version"];
location = infos["location"];
if( version_is_less( version: version, test_version: "4.4" ) ) {
report = report_fixed_ver( installed_version: version, fixed_version: "4.4", install_path: location );
security_message( port: port, data: report );
exit( 0 );
}
exit( 99 );