mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
75 lines
1.8 KiB
JSON
75 lines
1.8 KiB
JSON
{
|
||
"CVE_data_meta": {
|
||
"ID": "CVE-2022-2133",
|
||
"ASSIGNER": "contact@wpscan.com",
|
||
"STATE": "PUBLIC",
|
||
"TITLE": "OAuth Single Sign On < 6.22.6 - Authentication Bypass"
|
||
},
|
||
"data_format": "MITRE",
|
||
"data_type": "CVE",
|
||
"data_version": "4.0",
|
||
"generator": "WPScan CVE Generator",
|
||
"affects": {
|
||
"vendor": {
|
||
"vendor_data": [
|
||
{
|
||
"vendor_name": "Unknown",
|
||
"product": {
|
||
"product_data": [
|
||
{
|
||
"product_name": "OAuth Single Sign On – SSO (OAuth Client)",
|
||
"version": {
|
||
"version_data": [
|
||
{
|
||
"version_affected": "<",
|
||
"version_name": "6.22.6",
|
||
"version_value": "6.22.6"
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
}
|
||
},
|
||
"description": {
|
||
"description_data": [
|
||
{
|
||
"lang": "eng",
|
||
"value": "The OAuth Single Sign On WordPress plugin before 6.22.6 doesn't validate that OAuth access token requests are legitimate, which allows attackers to log onto the site with the only knowledge of a user's email address."
|
||
}
|
||
]
|
||
},
|
||
"references": {
|
||
"reference_data": [
|
||
{
|
||
"refsource": "MISC",
|
||
"url": "https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de",
|
||
"name": "https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de"
|
||
}
|
||
]
|
||
},
|
||
"problemtype": {
|
||
"problemtype_data": [
|
||
{
|
||
"description": [
|
||
{
|
||
"value": "CWE-287 Improper Authentication",
|
||
"lang": "eng"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
},
|
||
"credit": [
|
||
{
|
||
"lang": "eng",
|
||
"value": "Lana Codes"
|
||
}
|
||
],
|
||
"source": {
|
||
"discovery": "EXTERNAL"
|
||
}
|
||
} |