Vulnerability CVE-2022-0377


Published: 2022-02-28

Description:
Users of the LearnPress WordPress plugin before 4.1.5 can upload an image as a profile avatar after the registration. After this process the user crops and saves the image. Then a "POST" request that contains user supplied name of the image is sent to the server for renaming and cropping of the image. As a result of this request, the name of the user-supplied image is changed with a MD5 value. This process can be conducted only when type of the image is JPG or PNG. An attacker can use this vulnerability in order to rename an arbitrary image file. By doing this, they could destroy the design of the web site.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
WordPress Learnpress 4.1.4.1 Arbitrary Image Renaming
Ceylan Bozogulla...
03.02.2022

Type:

CWE-610

(Externally Controlled Reference to a Resource in Another Sphere)

CVSS2 => (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.5/10
2.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Thimpress -> Learnpress 

 References:
https://wpscan.com/vulnerability/0d95ada6-53e3-4a80-a395-eacd7b090f26
https://github.com/LearnPress/learnpress/commit/d1dc4af7ef2950f1000abc21bd9520fb3eb98faf
https://bozogullarindan.com/en/2022/01/wordpress-learnpress-plugin-4.1.4.1-arbitrary-image-renaming/

Copyright 2024, cxsecurity.com

 

Back to Top