cvelist/2023/3xxx/CVE-2023-3525.json

85 lines
2.8 KiB
JSON
Raw Normal View History

2023-07-06 14:00:42 +00:00
{
2023-07-12 05:00:39 +00:00
"data_version": "4.0",
2023-07-06 14:00:42 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-3525",
2023-07-12 05:00:39 +00:00
"ASSIGNER": "security@wordfence.com",
"STATE": "PUBLIC"
2023-07-06 14:00:42 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-07-12 05:00:39 +00:00
"value": "The Getnet Argentina para Woocommerce plugin for WordPress is vulnerable to authorization bypass due to missing validation on the 'webhook' function in versions up to, and including, 0.0.4. This makes it possible for unauthenticated attackers to set their payment status to 'APPROVED' without payment."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-639 Authorization Bypass Through User-Controlled Key"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "wanderlustcodes",
"product": {
"product_data": [
{
"product_name": "Getnet Argentina para Woocommerce",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0.0.1",
"version_value": "0.0.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/245e9117-ca63-458e-a094-60a759f5ec19?source=cve",
"refsource": "MISC",
"name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/245e9117-ca63-458e-a094-60a759f5ec19?source=cve"
},
{
"url": "https://www.youtube.com/watch?v=xTyWqh93AM0",
"refsource": "MISC",
"name": "https://www.youtube.com/watch?v=xTyWqh93AM0"
}
]
},
"credits": [
{
"lang": "en",
"value": "Kijam L\u00f3pez"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH"
2023-07-06 14:00:42 +00:00
}
]
}
}