.. / CVE-2022-0656

Exploit for uDraw <3.3.3 - Local File Inclusion (CVE-2022-0656)

Description:

uDraw before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc).

Nuclei Template

View the template here CVE-2022-0656.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-0656.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://github.com/cyllective/CVEs
https://nvd.nist.gov/vuln/detail/CVE-2022-0656
https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151
https://github.com/ARPSyndicate/kenzer-templates