diff --git a/2022/22xxx/CVE-2022-22734.json b/2022/22xxx/CVE-2022-22734.json index 45d1024becd..7bf56d2c481 100644 --- a/2022/22xxx/CVE-2022-22734.json +++ b/2022/22xxx/CVE-2022-22734.json @@ -1,75 +1,89 @@ { - "CVE_data_meta": { - "ID": "CVE-2022-22734", - "ASSIGNER": "contact@wpscan.com", - "STATE": "PUBLIC", - "TITLE": "Simple Quotation <= 1.3.2 - Quote Creation/Edition via CSRF to Stored Cross-Site Scripting" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "generator": "WPScan CVE Generator", - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Unknown", - "product": { - "product_data": [ - { - "product_name": "Simple Quotation", - "version": { - "version_data": [ - { - "version_affected": "<=", - "version_name": "1.3.2", - "version_value": "1.3.2" - } - ] - } - } - ] - } - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The Simple Quotation WordPress plugin through 1.3.2 does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them" - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "MISC", - "url": "https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251", - "name": "https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "value": "CWE-352 Cross-Site Request Forgery (CSRF)", - "lang": "eng" - } + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2022-22734", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Simple Quotation WordPress plugin through 1.3.2 does not have CSRF check when creating or editing a quote and does not sanitise and escape Quotes. As a result, attacker could make a logged in admin create or edit arbitrary quote, and put Cross-Site Scripting payloads in them" + } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-116 Improper Encoding or Escaping of Output" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Simple Quotation", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "status": "affected", + "versionType": "custom", + "version": "0", + "lessThanOrEqual": "1.3.2" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/f6e15a23-8f8c-47c2-8227-e277856d8251" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Abhishek Bhoir" + }, + { + "lang": "en", + "value": "WPScan" + } ] - }, - "credit": [ - { - "lang": "eng", - "value": "Abhishek Bhoir" - } - ], - "source": { - "discovery": "EXTERNAL" - } } \ No newline at end of file diff --git a/2022/2xxx/CVE-2022-2552.json b/2022/2xxx/CVE-2022-2552.json index 2ba5423909d..2f5fdef43b0 100644 --- a/2022/2xxx/CVE-2022-2552.json +++ b/2022/2xxx/CVE-2022-2552.json @@ -24,6 +24,14 @@ "value": "CWE-862 Missing Authorization" } ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-306 Missing Authentication for Critical Function" + } + ] } ] }, diff --git a/2022/3xxx/CVE-2022-3911.json b/2022/3xxx/CVE-2022-3911.json index 127fb373e36..77f15b7e6eb 100644 --- a/2022/3xxx/CVE-2022-3911.json +++ b/2022/3xxx/CVE-2022-3911.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "The iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more WordPress plugin before 3.3.3 does does not have authorisation and CSRF in an AJAX action, and does not ensure that the options to be updated belong to the plugin as long as they are arrays. As a result, any authenticated users, such as subscriber can grant themselves any privileges, such as edit_plugins etc" + "value": "The iubenda WordPress plugin before 3.3.3 does does not have authorisation and CSRF in an AJAX action, and does not ensure that the options to be updated belong to the plugin as long as they are arrays. As a result, any authenticated users, such as subscriber can grant themselves any privileges, such as edit_plugins etc" } ] }, @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "CWE-269 Improper Privilege Management" + "value": "CWE-862 Missing Authorization" } ] }, @@ -47,8 +47,9 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_affected": "<", + "version_name": "0", + "version_value": "3.3.3" } ] } diff --git a/2023/2xxx/CVE-2023-2527.json b/2023/2xxx/CVE-2023-2527.json index 8719a6993b5..0494927f32f 100644 --- a/2023/2xxx/CVE-2023-2527.json +++ b/2023/2xxx/CVE-2023-2527.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + "value": "The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin" } ] }, diff --git a/2023/3xxx/CVE-2023-3500.json b/2023/3xxx/CVE-2023-3500.json new file mode 100644 index 00000000000..21053749913 --- /dev/null +++ b/2023/3xxx/CVE-2023-3500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file