cvelist/2021/24xxx/CVE-2021-24375.json

81 lines
2.3 KiB
JSON
Raw Normal View History

2021-01-14 16:06:39 +00:00
{
2021-07-05 13:56:03 +02:00
"CVE_data_meta": {
"ID": "CVE-2021-24375",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Motor theme < 3.1.0 - Local File Inclusion"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Stockware",
"product": {
"product_data": [
{
"product_name": "Motor",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "3.1.0",
"version_value": "3.1.0"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Lack of authentication or validation in motor_load_more, motor_gallery_load_more, motor_quick_view and motor_project_quick_view AJAX handlers of the Motor WordPress theme before 3.1.0 allows an unauthenticated attacker access to arbitrary files in the server file system, and to execute arbitrary php scripts found on the server file system. We found no vulnerability for uploading files with this theme, so any scripts to be executed must already be on the server file system."
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"url": "https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f",
"name": "https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f"
},
{
"refsource": "MISC",
"url": "https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/",
"name": "https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"lang": "eng"
}
2021-01-14 16:06:39 +00:00
]
2021-07-05 13:56:03 +02:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "Harald Eilertsen (Jetpack)"
2021-01-14 16:06:39 +00:00
}
2021-07-05 13:56:03 +02:00
],
"source": {
"discovery": "UNKNOWN"
}
}