cvelist/2022/1xxx/CVE-2022-1663.json
2022-08-29 16:35:53 +02:00

76 lines
1.8 KiB
JSON

{
"CVE_data_meta": {
"ID": "CVE-2022-1663",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Stop Spam Comments <= 0.2.1.2 - Access Token Bypass"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Stop Spam Comments",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0.2.1.2",
"version_value": "0.2.1.2"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request."
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70",
"name": "https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-200 Information Exposure",
"lang": "eng"
}
]
}
]
},
"credit": [
{
"lang": "eng",
"value": "Daniel Ruf"
}
],
"source": {
"discovery": "EXTERNAL"
}
}