cvelist/2023/4xxx/CVE-2023-4279.json

80 lines
2.4 KiB
JSON
Raw Normal View History

2023-08-09 20:00:31 +00:00
{
2023-09-04 12:00:33 +00:00
"data_version": "4.0",
2023-08-09 20:00:31 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-4279",
2023-09-04 12:00:33 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-08-09 20:00:31 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-09-04 12:00:33 +00:00
"value": "This User Activity Log WordPress plugin before 1.6.7 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-290 Authentication Bypass by Spoofing"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "User Activity Log",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "1.6.7"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/2bd2579e-b383-4d12-b207-6fc32cfb82bc",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/2bd2579e-b383-4d12-b207-6fc32cfb82bc"
2023-08-09 20:00:31 +00:00
}
]
2023-09-04 12:00:33 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Bartlomiej Marek and Tomasz Swiadek"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-08-09 20:00:31 +00:00
}