2024-07-30 20:03:12 +00:00
{
"id" : "CVE-2024-41305" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-07-30T18:15:05.910" ,
2024-08-08 16:03:15 +00:00
"lastModified" : "2024-08-08T14:36:06.423" ,
"vulnStatus" : "Analyzed" ,
2024-07-30 20:03:12 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A Server-Side Request Forgery (SSRF) in the Plugins Page of WonderCMS v3.4.3 allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the pluginThemeUrl parameter."
2024-07-31 14:03:14 +00:00
} ,
{
"lang" : "es" ,
"value" : " Server-Side Request Forgery (SSRF) en la p\u00e1gina de complementos de WonderCMS v3.4.3 permite a los atacantes forzar a la aplicaci\u00f3n a realizar solicitudes arbitrarias mediante la inyecci\u00f3n de URL manipuladas en el par\u00e1metro pluginThemeUrl."
2024-07-30 20:03:12 +00:00
}
] ,
2024-08-01 14:03:18 +00:00
"metrics" : {
"cvssMetricV31" : [
2024-08-08 16:03:15 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 3.4
} ,
2024-08-01 14:03:18 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 7.1 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.7
}
]
} ,
"weaknesses" : [
2024-08-08 16:03:15 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-918"
}
]
} ,
2024-08-01 14:03:18 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-352"
}
]
}
] ,
2024-08-08 16:03:15 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wondercms:wondercms:3.4.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF7DC199-D4A1-44A2-977F-E614C0F6B98A"
}
]
}
]
}
] ,
2024-07-30 20:03:12 +00:00
"references" : [
{
"url" : "https://github.com/patrickdeanramos/WonderCMS-version-3.4.3-is-vulnerable-to-Server-Side-Request-Forgery" ,
2024-08-08 16:03:15 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit"
]
2024-07-30 20:03:12 +00:00
}
]
}