# N/A
## 漏洞概述
Jeg Elementor Kit 插件在更新插件设置的各种函数中存在授权绕过漏洞。未授权用户可以获取一个易于获得的 nonce,从而更新 MailChimp API 密钥、全局样式、404 页面设置和启用的元素。
## 影响版本
- 2.5.6 及以下版本
## 漏洞细节
未授权用户可以通过从插件编辑的页面中获取的 nonce 来绕过授权机制,对上述设置进行更改。
## 影响
- 未授权用户可以修改 MailChimp API 密钥。
- 未授权用户可以修改全局样式和 404 页面设置。
- 未授权用户可以更改启用的元素。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements. | https://github.com/projectdiscovery/nuclei-templates/blob/main/passive/cves/2022/CVE-2022-3805.yaml | POC详情 |
| 2 | The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-3805.yaml | POC详情 |
标题: Jeg Elementor Kit – WordPress plugin | WordPress.org -- 🔗来源链接
标签:
暂无评论