cvelist/2021/24xxx/CVE-2021-24831.json

75 lines
1.8 KiB
JSON
Raw Normal View History

2021-01-14 16:05:23 +00:00
{
2022-01-03 09:30:07 +01:00
"CVE_data_meta": {
"ID": "CVE-2021-24831",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Tab - Accordion, FAQ < 1.3.2 - Unauthenticated AJAX Calls"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Tab Accordion, FAQ",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.3.2",
"version_value": "1.3.2"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900",
"name": "https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-284 Improper Access Control",
"lang": "eng"
}
2021-01-14 16:05:23 +00:00
]
2022-01-03 09:30:07 +01:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "Brandon Roldan"
2021-01-14 16:05:23 +00:00
}
2022-01-03 09:30:07 +01:00
],
"source": {
"discovery": "EXTERNAL"
}
2021-01-14 16:05:23 +00:00
}