cvelist/2023/0xxx/CVE-2023-0285.json

80 lines
2.4 KiB
JSON
Raw Normal View History

2023-01-13 11:00:37 +00:00
{
2023-02-21 09:00:38 +00:00
"data_version": "4.0",
2023-01-13 11:00:37 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0285",
2023-02-21 09:00:38 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-01-13 11:00:37 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-02-21 09:00:38 +00:00
"value": "The Real Media Library WordPress plugin before 4.18.29 does not sanitise and escape the created folder names, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-Site Scripting (XSS)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Real Media Library: Media Library Folder & File Manager",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.18.29"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348"
2023-01-13 11:00:37 +00:00
}
]
2023-02-21 09:00:38 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Bipul Jaiswal from SecureLayer7"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-01-13 11:00:37 +00:00
}