diff --git a/2021/24xxx/CVE-2021-24232.json b/2021/24xxx/CVE-2021-24232.json index 98e061922a2..d9687a3c9c0 100644 --- a/2021/24xxx/CVE-2021-24232.json +++ b/2021/24xxx/CVE-2021-24232.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24232", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24232", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Advanced Booking Calendar < 1.6.8 - Authenticated Reflected Cross-Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Advanced Booking Calendar", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.6.8", + "version_value": "1.6.8" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Advanced Booking Calendar WordPress plugin before 1.6.8 does not sanitise the license error message when output in the settings page, leading to an authenticated reflected Cross-Site Scripting issue" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/f06629b5-8b15-48eb-a7a7-78b693e06b71", + "name": "https://wpscan.com/vulnerability/f06629b5-8b15-48eb-a7a7-78b693e06b71" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "iohex" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24233.json b/2021/24xxx/CVE-2021-24233.json index fb8b671ad6b..9c6426e2e01 100644 --- a/2021/24xxx/CVE-2021-24233.json +++ b/2021/24xxx/CVE-2021-24233.json @@ -1,18 +1,85 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24233", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24233", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Cooked Pro < 1.7.5.6 - Unauthenticated Reflected Cross Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Cooked Ppro", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.7.5.6", + "version_value": "1.7.5.6" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Cooked Pro WordPress plugin before 1.7.5.6 was affected by unauthenticated reflected Cross-Site Scripting issues, due to improper sanitisation of user input while being output back in pages as an arbitrary attribute." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/ed620de5-1ad2-4480-b08b-719480472bc0", + "name": "https://wpscan.com/vulnerability/ed620de5-1ad2-4480-b08b-719480472bc0" + }, + { + "refsource": "MISC", + "url": "https://www.getastra.com/blog/911/reflected-xss-found-in-cooked-pro-recipe-plugin-for-wordpress/", + "name": "https://www.getastra.com/blog/911/reflected-xss-found-in-cooked-pro-recipe-plugin-for-wordpress/" + }, + { + "refsource": "MISC", + "url": "https://www.jinsonvarghese.com/reflected-xss-vulnerability-found-in-cooked-pro-plugin/", + "name": "https://www.jinsonvarghese.com/reflected-xss-vulnerability-found-in-cooked-pro-plugin/" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Jinson Varghese Behanan" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24234.json b/2021/24xxx/CVE-2021-24234.json index c3107fc5e4d..2b6d726a534 100644 --- a/2021/24xxx/CVE-2021-24234.json +++ b/2021/24xxx/CVE-2021-24234.json @@ -1,18 +1,85 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24234", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24234", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Ivory Search < 4.6.1 - Reflected Cross Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Ivory Search – WordPress Search Plugin", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "4.6.1", + "version_value": "4.6.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Search Forms page of the Ivory Search WordPress lugin before 4.6.1 did not properly sanitise the tab parameter before output it in the page, leading to a reflected Cross-Site Scripting issue when opening a malicious crafted link as a high privilege user. Knowledge of a form id is required to conduct the attack." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/ecc620be-8e29-4860-9d32-86b5814a3835", + "name": "https://wpscan.com/vulnerability/ecc620be-8e29-4860-9d32-86b5814a3835" + }, + { + "refsource": "MISC", + "url": "https://www.getastra.com/blog/911/plugin-exploit/reflected-xss-vulnerability-in-ivory-search-wp-plugin/", + "name": "https://www.getastra.com/blog/911/plugin-exploit/reflected-xss-vulnerability-in-ivory-search-wp-plugin/" + }, + { + "refsource": "MISC", + "url": "https://www.jinsonvarghese.com/reflected-xss-vulnerability-found-in-ivory-search-plugin/", + "name": "https://www.jinsonvarghese.com/reflected-xss-vulnerability-found-in-ivory-search-plugin/" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Jinson Varghese Behanan" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24235.json b/2021/24xxx/CVE-2021-24235.json index 471cf33c4eb..4f8392dbd9a 100644 --- a/2021/24xxx/CVE-2021-24235.json +++ b/2021/24xxx/CVE-2021-24235.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24235", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24235", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Goto - Tour & Travel < 2.0 - Unauthenticated Reflected XSS" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Goto", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.0", + "version_value": "2.0" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Goto WordPress theme before 2.0 does not sanitise the keywords and start_date GET parameter on its Tour List page, leading to an unauthenticated reflected Cross-Site Scripting issue." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139", + "name": "https://wpscan.com/vulnerability/eece90aa-582b-4c49-8b7c-14027f9df139" + }, + { + "refsource": "MISC", + "url": "https://m0ze.ru/vulnerability/[2021-02-10]-[WordPress]-[CWE-79]-Goto-WordPress-Theme-v1.9.txt", + "name": "https://m0ze.ru/vulnerability/[2021-02-10]-[WordPress]-[CWE-79]-Goto-WordPress-Theme-v1.9.txt" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "m0ze" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24237.json b/2021/24xxx/CVE-2021-24237.json index 0c5958a2de1..325b473c87b 100644 --- a/2021/24xxx/CVE-2021-24237.json +++ b/2021/24xxx/CVE-2021-24237.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24237", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24237", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Realteo < 1.2.4 - Unauthenticated Reflected Cross-Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PureThemes", + "product": { + "product_data": [ + { + "product_name": "Realteo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.2.4", + "version_value": "1.2.4" + } + ] + } + }, + { + "product_name": "Findeo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.3.1", + "version_value": "1.3.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", + "name": "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e" + }, + { + "refsource": "MISC", + "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", + "name": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" + }, + { + "refsource": "MISC", + "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Findeo-WordPress-Theme-v1.3.0.txt", + "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Findeo-WordPress-Theme-v1.3.0.txt" + }, + { + "refsource": "MISC", + "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt", + "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "m0ze" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24238.json b/2021/24xxx/CVE-2021-24238.json index 0eabae6d79b..e8fa6158547 100644 --- a/2021/24xxx/CVE-2021-24238.json +++ b/2021/24xxx/CVE-2021-24238.json @@ -1,18 +1,102 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24238", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24238", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Realteo < 1.2.4 - Arbitrary Property Deletion via IDOR" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "PureThemes", + "product": { + "product_data": [ + { + "product_name": "Realteo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.2.4", + "version_value": "1.2.4" + } + ] + } + }, + { + "product_name": "Findeo", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.3.1", + "version_value": "1.3.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", + "name": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5" + }, + { + "refsource": "MISC", + "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", + "name": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" + }, + { + "refsource": "MISC", + "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt", + "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt" + }, + { + "refsource": "MISC", + "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt", + "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-284 Improper Access Control", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "m0ze" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24239.json b/2021/24xxx/CVE-2021-24239.json index de21d6c928e..6f173a468bf 100644 --- a/2021/24xxx/CVE-2021-24239.json +++ b/2021/24xxx/CVE-2021-24239.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24239", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24239", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Pie Register < 3.7.0.1 - Reflected Cross-Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Pie Register – User Registration Forms. Invitation based registrations, Custom Login, Payments", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "3.7.0.1", + "version_value": "3.7.0.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Pie Register – User Registration Forms. Invitation based registrations, Custom Login, Payments WordPress plugin before 3.7.0.1 does not sanitise the invitaion_code GET parameter when outputting it in the Activation Code page, leading to a reflected Cross-Site Scripting issue." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/f1b67f40-642f-451e-a67a-b7487918ee34", + "name": "https://wpscan.com/vulnerability/f1b67f40-642f-451e-a67a-b7487918ee34" + }, + { + "refsource": "MISC", + "url": "https://plugins.trac.wordpress.org/changeset/2507536/", + "name": "https://plugins.trac.wordpress.org/changeset/2507536/" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "iohex" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24240.json b/2021/24xxx/CVE-2021-24240.json index 422ccc48a65..1548042c3c8 100644 --- a/2021/24xxx/CVE-2021-24240.json +++ b/2021/24xxx/CVE-2021-24240.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24240", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24240", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Business Hours Pro <= 5.5.0 - Unauthenticated Arbitrary File Upload to RCE" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Business Hours Pro", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "5.5.0", + "version_value": "5.5.0" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Business Hours Pro WordPress plugin through 5.5.0 allows a remote attacker to upload arbitrary files using its manual update functionality, leading to an unauthenticated remote code execution vulnerability." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/10528cb2-12a1-43f7-9b7d-d75d18fdf5bb", + "name": "https://wpscan.com/vulnerability/10528cb2-12a1-43f7-9b7d-d75d18fdf5bb" + }, + { + "refsource": "MISC", + "url": "https://codecanyon.net/item/business-hours-pro-wordpress-plugin/9414879", + "name": "https://codecanyon.net/item/business-hours-pro-wordpress-plugin/9414879" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-434 Unrestricted Upload of File with Dangerous Type", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Harald Eilertsen" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24241.json b/2021/24xxx/CVE-2021-24241.json index a8a8ac7ce9b..2017520b8ba 100644 --- a/2021/24xxx/CVE-2021-24241.json +++ b/2021/24xxx/CVE-2021-24241.json @@ -1,18 +1,85 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24241", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24241", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Advanced Custom Field Pro < 5.9.1 - Reflected Cross-Site Scripting (XSS)" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Advanced Custom Fields Pro", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "5.9.1", + "version_value": "5.9.1" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Advanced Custom Fields Pro WordPress plugin before 5.9.1 did not properly escape the generated update URL when outputting it in an attribute, leading to a reflected Cross-Site Scripting issue in the update settings page." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f", + "name": "https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f" + }, + { + "refsource": "MISC", + "url": "https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1", + "name": "https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1" + }, + { + "refsource": "MISC", + "url": "https://www.advancedcustomfields.com/blog/acf-5-9-1-release/", + "name": "https://www.advancedcustomfields.com/blog/acf-5-9-1-release/" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-79 Cross-site Scripting (XSS)", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "Juan David Ordoñez Noriega" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file diff --git a/2021/24xxx/CVE-2021-24242.json b/2021/24xxx/CVE-2021-24242.json index 1f78ede2cf4..3ec90a2ba7b 100644 --- a/2021/24xxx/CVE-2021-24242.json +++ b/2021/24xxx/CVE-2021-24242.json @@ -1,18 +1,75 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2021-24242", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] + "CVE_data_meta": { + "ID": "CVE-2021-24242", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC", + "TITLE": "Tutor LMS < 1.8.8 - Authenticated Local File Inclusion" + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "generator": "WPScan CVE Generator", + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Themeum", + "product": { + "product_data": [ + { + "product_name": "Tutor LMS – eLearning and online course solution", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.8.8", + "version_value": "1.8.8" + } + ] + } + } + ] + } + } + ] } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.8 is affected by a local file inclusion vulnerability through the maliciously constructed sub_page parameter of the plugin's Tools, allowing high privilege users to include any local php file" + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://wpscan.com/vulnerability/20f3e63a-31d8-49a0-b4ef-209749feff5c", + "name": "https://wpscan.com/vulnerability/20f3e63a-31d8-49a0-b4ef-209749feff5c" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "lang": "eng" + } + ] + } + ] + }, + "credit": [ + { + "lang": "eng", + "value": "sasa" + } + ], + "source": { + "discovery": "UNKNOWN" + } } \ No newline at end of file