Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1020 CNY

100%

CVE-2022-1119 โ€” AI Deep Analysis Summary

CVSS 7.5 ยท High

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: Path Traversal / Arbitrary File Read. The `eeFile` parameter in `ee-downloader.php` lacks input validation.โ€ฆ

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **CWE-22**: Improper Limitation of a Pathname to a Restricted Directory. ๐Ÿ’ฅ **Flaw**: Missing controls/filtering on the `eeFile` parameter allows directory traversal sequences (e.g., `../`).

Q3Who is affected? (Versions/Components)

๐Ÿ“ฆ **Product**: WordPress Plugin 'The Simple File List'. ๐Ÿ‘ค **Vendor**: eemitch. ๐Ÿ“… **Affected**: Version 3.2.7 and earlier. โœ… **Safe**: Version 3.2.8+.

Q4What can hackers do? (Privileges/Data)

๐Ÿ•ต๏ธ **Action**: Unauthenticated attackers can retrieve arbitrary files. ๐Ÿ“‚ **Data**: Server-side files (config, source code, etc.). ๐Ÿ”“ **Privileges**: No login required (PR:N).

Q5Is exploitation threshold high? (Auth/Config)

โšก **Threshold**: LOW. ๐Ÿšซ **Auth**: None required (Unauthenticated). ๐ŸŒ **Network**: Remote (AV:N). ๐ŸŽฏ **Complexity**: Low (AC:L). Easy to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ”ฅ **Yes**: Public PoCs exist. ๐Ÿ“‚ **GitHub**: `z92g/CVE-2022-1119` (Batch/Single scan tool). ๐Ÿงช **Nuclei**: Template available for automated scanning.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Check**: Request `~/includes/ee-downloader.php` with `eeFile` parameter containing `../`. ๐Ÿ“ก **Scan**: Use Nuclei templates or the provided Python PoC script to detect vulnerable instances.

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿ› ๏ธ **Fix**: Upgrade to **Simple File List version 3.2.8** or later. ๐Ÿ”„ **Action**: Update the plugin via WordPress dashboard or manually replace files.

Q9What if no patch? (Workaround)

๐Ÿšง **Workaround**: If patching is delayed, restrict access to `ee-downloader.php` via `.htaccess` or WAF rules. ๐Ÿšซ **Block**: Deny requests containing `../` in the `eeFile` parameter.

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ด **Priority**: HIGH. ๐Ÿ“ข **Reason**: Unauthenticated, remote, easy to exploit, and public PoCs are available. Immediate patching recommended.