CVE-2022-29446

Status: Analyzed
Last modified: 26-05-2022
Published: 19-05-2022
7.2

SUMMARY CVE-2022-29446

Authenticated (administrator or higher role) Local File Inclusion (LFI) vulnerability in Wow-Company's Counter Box plugin <= 1.1.1 at WordPress.

Access CVSS3 CVE-2022-29446

Attack Complexity Attack Vector Privileges Required Scope User Interaction
LOW NETWORK HIGH UNCHANGED NONE

Impact CVSS3 CVE-2022-29446

Confidentiality Integrity Availability
HIGH HIGH HIGH

Details CVE-2022-29446

EPSS 0.00099
EPSS % 0.41864
References
CWE CWE-552
CAPEC
  • Collect Data from Common Resource Locations: An adversary exploits well-known locations for resources for the purposes of undermining the security of the target. In many, if not most systems, files and resources are organized in a default tree structure. This can be useful for adversaries because they often know where to look for resources or files that are necessary for attacks. Even when the precise location of a targeted resource may not be known, naming conventions may indicate a small area of the target machine's file tree where the resources are typically located. For example, configuration files are normally stored in the /etc director on Unix systems. Adversaries can take advantage of this to commit other types of attacks.
  • Probe System Files: An adversary obtains unauthorized information due to improperly protected files. If an application stores sensitive information in a file that is not protected by proper access control, then an adversary can access the file and search for sensitive information.
Vulnerable Configurations
  • cpe:2.3:a:wow-company:counter_box:-:*:*:*:*:wordpress:*:*
    cpe:2.3:a:wow-company:counter_box:-:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:wow-company:counter_box:1.0:*:*:*:*:wordpress:*:*
    cpe:2.3:a:wow-company:counter_box:1.0:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:wow-company:counter_box:1.1:*:*:*:*:wordpress:*:*
    cpe:2.3:a:wow-company:counter_box:1.1:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:wow-company:counter_box:1.1.1:*:*:*:*:wordpress:*:*
    cpe:2.3:a:wow-company:counter_box:1.1.1:*:*:*:*:wordpress:*:*
CVSS3 Source nvd@nist.gov
CVSS3 Type Primary
CVSS3 Vector CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

ATOM RSS Feed Link for CVE Vulnerabilities

CVE Data Propulsed by AKAOMA CyberSecurity