cvelist/2021/24xxx/CVE-2021-24748.json

75 lines
1.8 KiB
JSON
Raw Normal View History

2021-01-14 16:03:32 +00:00
{
2021-11-29 09:23:33 +01:00
"CVE_data_meta": {
"ID": "CVE-2021-24748",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Email Before Download < 6.8 - Admin+ SQL Injection"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Email Before Download",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.8",
"version_value": "6.8"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Email Before Download WordPress plugin before 6.8 does not properly validate and escape the order and orderby GET parameters before using them in SQL statements, leading to authenticated SQL injection issues"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1",
"name": "https://wpscan.com/vulnerability/a8625b84-337d-4c4d-a698-73e59d1f8ee1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-89 SQL Injection",
"lang": "eng"
}
2021-01-14 16:03:32 +00:00
]
2021-11-29 09:23:33 +01:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "bl4derunner"
2021-01-14 16:03:32 +00:00
}
2021-11-29 09:23:33 +01:00
],
"source": {
"discovery": "EXTERNAL"
}
2021-01-14 16:03:32 +00:00
}