2024-12-08 03:06:42 +00:00

78 lines
2.4 KiB
JSON

{
"id": "CVE-2023-4294",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-09-11T20:15:11.973",
"lastModified": "2024-11-21T08:34:48.073",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The URL Shortify WordPress plugin before 1.7.6 does not properly escape the value of the referer header, thus allowing an unauthenticated attacker to inject malicious javascript that will trigger in the plugins admin panel with statistics of the created short link."
},
{
"lang": "es",
"value": "El complemento URL Shortify de WordPress anterior a 1.7.6 no escapa correctamente del valor del encabezado de referencia, lo que permite que un atacante no autenticado inyecte javascript malicioso que se activar\u00e1 en el panel de administraci\u00f3n del complemento con estad\u00edsticas del enlace creado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kaizencoders:url_shortify:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.6",
"matchCriteriaId": "27BB1B0B-F2E5-4878-A6EB-33569A428531"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}