CVE-2022-0656

The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:webtoprint:web_to_print_shop\:udraw:*:*:*:*:*:wordpress:*:*

History

12 May 2022, 14:15

Type Values Removed Values Added
References (MISC) https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 - (MISC) https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 - Exploit, Third Party Advisory
First Time Webtoprint web To Print Shop\
Webtoprint
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:a:webtoprint:web_to_print_shop\:udraw:*:*:*:*:*:wordpress:*:*

25 Apr 2022, 16:30

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-25 16:16

Updated : 2023-12-10 14:22


NVD link : CVE-2022-0656

Mitre link : CVE-2022-0656

CVE.ORG link : CVE-2022-0656


JSON object : View

Products Affected

webtoprint

  • web_to_print_shop\
CWE
CWE-552

Files or Directories Accessible to External Parties