.. / CVE-2022-0679

Exploit for WordPress Narnoo Distributor <=2.5.1 - Local File Inclusion (CVE-2022-0679)

Description:

WordPress Narnoo Distributor plugin 2.5.1 and prior is susceptible to local file inclusion. The plugin does not validate and sanitize the lib_path parameter before being passed into a call to require() via the narnoo_distributor_lib_request AJAX action, and the content of the file is displayed in the response as JSON data. This can also lead to a remote code execution vulnerability depending on system and configuration.

Nuclei Template

View the template here CVE-2022-0679.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-0679.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://wpscan.com/vulnerability/0ea79eb1-6561-4c21-a20b-a1870863b0a8
https://github.com/cyllective/CVEs
https://nvd.nist.gov/vuln/detail/CVE-2022-0679
https://github.com/ARPSyndicate/kenzer-templates