mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
81 lines
2.3 KiB
JSON
81 lines
2.3 KiB
JSON
{
|
||
"CVE_data_meta": {
|
||
"ID": "CVE-2021-24915",
|
||
"ASSIGNER": "contact@wpscan.com",
|
||
"STATE": "PUBLIC",
|
||
"TITLE": "Contest Gallery < 13.1.0.6 - Missing Access Controls to Unauthenticated SQL injection / Email Address Disclosure"
|
||
},
|
||
"data_format": "MITRE",
|
||
"data_type": "CVE",
|
||
"data_version": "4.0",
|
||
"generator": "WPScan CVE Generator",
|
||
"affects": {
|
||
"vendor": {
|
||
"vendor_data": [
|
||
{
|
||
"vendor_name": "Unknown",
|
||
"product": {
|
||
"product_data": [
|
||
{
|
||
"product_name": "Contest Gallery – Photo Contest Plugin for WordPress",
|
||
"version": {
|
||
"version_data": [
|
||
{
|
||
"version_affected": "<",
|
||
"version_name": "13.1.0.6",
|
||
"version_value": "13.1.0.6"
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
}
|
||
},
|
||
"description": {
|
||
"description_data": [
|
||
{
|
||
"lang": "eng",
|
||
"value": "The Contest Gallery WordPress plugin before 13.1.0.6 does not have capability checks and does not sanitise or escape the cg-search-user-name-original parameter before using it in a SQL statement when exporting users from a gallery, which could allow unauthenticated to perform SQL injections attacks, as well as get the list of all users registered on the blog, including their username and email address"
|
||
}
|
||
]
|
||
},
|
||
"references": {
|
||
"reference_data": [
|
||
{
|
||
"refsource": "MISC",
|
||
"url": "https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac",
|
||
"name": "https://wpscan.com/vulnerability/45ee86a7-1497-4c81-98b8-9a8e5b3d4fac"
|
||
},
|
||
{
|
||
"refsource": "MISC",
|
||
"url": "https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917",
|
||
"name": "https://gist.github.com/tpmiller87/6c05596fe27dd6f69f1aaba4cbb9c917"
|
||
}
|
||
]
|
||
},
|
||
"problemtype": {
|
||
"problemtype_data": [
|
||
{
|
||
"description": [
|
||
{
|
||
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
|
||
"lang": "eng"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
},
|
||
"credit": [
|
||
{
|
||
"lang": "eng",
|
||
"value": "Tyler Miller"
|
||
}
|
||
],
|
||
"source": {
|
||
"discovery": "EXTERNAL"
|
||
}
|
||
}
|