cvelist/2023/2xxx/CVE-2023-2359.json

89 lines
3.0 KiB
JSON
Raw Normal View History

2023-04-27 20:00:40 +00:00
{
2023-06-19 11:00:42 +00:00
"data_version": "4.0",
2023-04-27 20:00:40 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-2359",
2023-06-19 11:00:42 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-04-27 20:00:40 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-06-19 11:00:42 +00:00
"value": "The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94 Improper Control of Generation of Code ('Code Injection')"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Slider Revolution",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThanOrEqual": "6.6.12"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/a8350890-e6d4-4b04-a158-2b0ee3748e65",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/a8350890-e6d4-4b04-a158-2b0ee3748e65"
2023-04-27 20:00:40 +00:00
}
]
2023-06-19 11:00:42 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Marco Frison"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-04-27 20:00:40 +00:00
}