cvelist/2022/0xxx/CVE-2022-0771.json
2022-05-02 18:00:30 +02:00

75 lines
1.8 KiB
JSON

{
"CVE_data_meta": {
"ID": "CVE-2022-0771",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "SiteSuperCharger < 5.2.0 - Unauthenticated SQLi"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "SiteSuperCharger",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "5.2.0",
"version_value": "5.2.0"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SiteSuperCharger WordPress plugin before 5.2.0 does not validate, sanitise and escape various user inputs before using them in SQL statements via AJAX actions (available to both unauthenticated and authenticated users), leading to Unauthenticated SQL Injections"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75",
"name": "https://wpscan.com/vulnerability/6139e732-88f2-42cb-9dc3-42ad49731e75"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-89 SQL Injection",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "cydave"
}
],
"source": {
"discovery": "EXTERNAL"
}
}