mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
89 lines
3.5 KiB
JSON
89 lines
3.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2022-2696",
|
|
"ASSIGNER": "security@wordfence.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Restaurant Menu \u2013 Food Ordering System \u2013 Table Reservation plugin for WordPress is vulnerable to authorization bypass via several AJAX actions in versions up to, and including 2.3.0 due to missing capability checks and missing nonce validation. This makes it possible for authenticated attackers with minimal permissions to perform a wide variety of actions such as modifying the plugin's settings and modifying the ordering system preferences."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-862 Missing Authorization"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "gloriafood",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Restaurant Menu \u2013 Food Ordering System \u2013 Table Reservation",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "*",
|
|
"version_affected": "="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/browser/menu-ordering-reservations/trunk/includes/admin/class-glf-admin-screens.php?rev=2664283",
|
|
"refsource": "MISC",
|
|
"name": "https://plugins.trac.wordpress.org/browser/menu-ordering-reservations/trunk/includes/admin/class-glf-admin-screens.php?rev=2664283"
|
|
},
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2793398%40menu-ordering-reservations&new=2793398%40menu-ordering-reservations&sfp_email=&sfph_mail=",
|
|
"refsource": "MISC",
|
|
"name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2793398%40menu-ordering-reservations&new=2793398%40menu-ordering-reservations&sfp_email=&sfph_mail="
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2696",
|
|
"refsource": "MISC",
|
|
"name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-2696"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ptsfence"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/A:L/I:L/C:L/S:U/UI:N/PR:L/AC:L/AV:N",
|
|
"baseScore": 6.3,
|
|
"baseSeverity": "MEDIUM"
|
|
}
|
|
]
|
|
}
|
|
} |