Headline
CVE-2022-2252: update · microweber/microweber@187e949
Open Redirect in GitHub repository microweber/microweber prior to 1.2.19.
@@ -105,7 +105,15 @@ public function redirect($url)
$redirectUrl = site_url();
$parseUrl = parse_url($url);
if (isset($parseUrl[‘host’])) {
if(isset($parseUrl[‘user’]) and $parseUrl[‘user’]){
return \Redirect::to(site_url());
}
if(isset($parseUrl[‘pass’]) and $parseUrl[‘pass’]){
return \Redirect::to(site_url());
}
if ($parseUrl[‘host’] == site_hostname()) {
$redirectUrl = $url;
}
Related news
The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to deserialization of untrusted input via the 'remote_data' parameter in versions up to, and including 3.7.9. This makes it possible for authenticated attackers with contributor privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
The WordPress plugin Gallery for Social Photo is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.0.0.27 due to failure to properly check for the existence of a nonce in the function gifeed_duplicate_feed. This make it possible for unauthenticated attackers to duplicate existing posts or pages granted they can trick a site administrator into performing an action such as clicking on a link.
The DX Share Selection plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the dxss_admin_page() function found in the ~/dx-share-selection.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site's administrator into performing an action such as clicking on a link.
The plugin WP All Import is vulnerable to arbitrary file uploads due to missing file type validation via the wp_all_import_get_gz.php file in versions up to, and including, 3.6.7. This makes it possible for authenticated attackers, with administrator level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.
Open Redirect in GitHub repository microweber/microweber prior to 1.2.19.