cvelist/2022/1xxx/CVE-2022-1572.json

75 lines
1.8 KiB
JSON
Raw Normal View History

2022-05-04 12:01:20 +00:00
{
2022-06-27 10:50:06 +02:00
"CVE_data_meta": {
"ID": "CVE-2022-1572",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "HTML2WP <= 1.0.0 - Subscriber+ Arbitrary File Deletion"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "HTML2WP",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "1.0.0",
"version_value": "1.0.0"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks in an AJAX action, available to any authenticated users such as subscriber, which could allow them to delete arbitrary file"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5",
"name": "https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-862 Missing Authorization",
"lang": "eng"
}
2022-05-04 12:01:20 +00:00
]
2022-06-27 10:50:06 +02:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "Daniel Ruf"
2022-05-04 12:01:20 +00:00
}
2022-06-27 10:50:06 +02:00
],
"source": {
"discovery": "EXTERNAL"
}
2022-05-04 12:01:20 +00:00
}