CVE-2022-4023

The 3DPrint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious request that will create an archive of any files or directories on the target server by tricking a logged in admin into submitting a form. Furthermore the created archive has a predictable location and name, allowing the attacker to download the file if they know the time at which the form was submitted, making it possible to leak sensitive files like the WordPress configuration containing database credentials and secrets.
Configurations

Configuration 1 (hide)

cpe:2.3:a:3dprint_project:3dprint:*:*:*:*:*:wordpress:*:*

History

26 Jul 2023, 01:23

Type Values Removed Values Added
References (MISC) https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/ - (MISC) https://jetpack.com/blog/vulnerabilities-found-in-the-3dprint-premium-plugin/ - Exploit
References (MISC) https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8fee - (MISC) https://wpscan.com/vulnerability/859c6e7e-2381-4d93-a526-2000b4fb8fee - Exploit, Third Party Advisory
CPE cpe:2.3:a:3dprint_project:3dprint:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

17 Jul 2023, 14:22

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-17 14:15

Updated : 2024-02-05 00:01


NVD link : CVE-2022-4023

Mitre link : CVE-2022-4023

CVE.ORG link : CVE-2022-4023


JSON object : View

Products Affected

3dprint_project

  • 3dprint
CWE

No CWE.