cvelist/2022/1xxx/CVE-2022-1663.json

76 lines
1.8 KiB
JSON
Raw Normal View History

2022-05-10 21:02:19 +00:00
{
2022-08-29 16:35:53 +02:00
"CVE_data_meta": {
"ID": "CVE-2022-1663",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Stop Spam Comments <= 0.2.1.2 - Access Token Bypass"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Stop Spam Comments",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0.2.1.2",
"version_value": "0.2.1.2"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70",
"name": "https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-200 Information Exposure",
"lang": "eng"
}
2022-05-10 21:02:19 +00:00
]
2022-08-29 16:35:53 +02:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "Daniel Ruf"
2022-05-10 21:02:19 +00:00
}
2022-08-29 16:35:53 +02:00
],
"source": {
"discovery": "EXTERNAL"
}
}