From 86342ca744d99c66c5c5b412137b41d624f776d4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 28 Nov 2024 13:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/54xxx/CVE-2024-54091.json | 18 ++++++++ 2024/7xxx/CVE-2024-7747.json | 81 ++++++++++++++++++++++++++++++++-- 2 files changed, 95 insertions(+), 4 deletions(-) create mode 100644 2024/54xxx/CVE-2024-54091.json diff --git a/2024/54xxx/CVE-2024-54091.json b/2024/54xxx/CVE-2024-54091.json new file mode 100644 index 00000000000..bc92dbe1266 --- /dev/null +++ b/2024/54xxx/CVE-2024-54091.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-54091", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/7xxx/CVE-2024-7747.json b/2024/7xxx/CVE-2024-7747.json index a2bd49da79a..01b0baa41fa 100644 --- a/2024/7xxx/CVE-2024-7747.json +++ b/2024/7xxx/CVE-2024-7747.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-7747", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Wallet for WooCommerce plugin for WordPress is vulnerable to incorrect conversion between numeric types in all versions up to, and including, 1.5.6. This is due to a numerical logic flaw when transferring funds to another user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create funds during a transfer and distribute these funds to any number of other users or their own account, rendering products free. Attackers could also request to withdraw funds if the Wallet Withdrawal extension is used and the request is approved by an administrator." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-681 Incorrect Conversion between Numeric Types", + "cweId": "CWE-681" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "subratamal", + "product": { + "product_data": [ + { + "product_name": "Wallet for WooCommerce", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.5.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd8f3eb7-ac60-46c4-b41f-5d89e3133042?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd8f3eb7-ac60-46c4-b41f-5d89e3133042?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/woo-wallet/trunk/includes/class-woo-wallet-frontend.php#L407", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/woo-wallet/trunk/includes/class-woo-wallet-frontend.php#L407" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3145131/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3145131/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Matthew Rollings" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" } ] }