cvelist/2024/4xxx/CVE-2024-4382.json

89 lines
3.0 KiB
JSON
Raw Normal View History

2024-04-30 21:00:34 +00:00
{
2024-06-21 06:00:33 +00:00
"data_version": "4.0",
2024-04-30 21:00:34 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-4382",
2024-06-21 06:00:33 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2024-04-30 21:00:34 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-21 06:00:33 +00:00
"value": "The CB (legacy) WordPress plugin through 0.9.4.18 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting codes, timeframes, and bookings via CSRF attacks"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "CB (legacy)",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"versionType": "semver",
"version": "0",
"lessThanOrEqual": "0.9.4.18"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/"
2024-04-30 21:00:34 +00:00
}
]
2024-06-21 06:00:33 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Bob Matyas"
},
{
"lang": "en",
"value": "WPScan"
}
]
2024-04-30 21:00:34 +00:00
}