cvelist/2024/6xxx/CVE-2024-6695.json

80 lines
2.3 KiB
JSON
Raw Normal View History

2024-07-11 19:00:32 +00:00
{
2024-07-31 06:00:39 +00:00
"data_version": "4.0",
2024-07-11 19:00:32 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-6695",
2024-07-31 06:00:39 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2024-07-11 19:00:32 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-07-31 06:00:39 +00:00
"value": "it's possible for an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions. This is due to improper logic flow on the user registration process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287 Improper Authentication"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "User Profile Builder",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "3.11.9"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/4afa5c85-ce27-4ca7-bba2-61fb39c53a5b/",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/4afa5c85-ce27-4ca7-bba2-61fb39c53a5b/"
2024-07-11 19:00:32 +00:00
}
]
2024-07-31 06:00:39 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "John Castro"
},
{
"lang": "en",
"value": "WPScan"
}
]
2024-07-11 19:00:32 +00:00
}