2024-07-15 18:03:13 +00:00

88 lines
3.4 KiB
JSON

{
"id": "CVE-2024-3073",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-13T09:15:13.930",
"lastModified": "2024-07-15T17:31:24.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Easy WP SMTP by SendLayer \u2013 WordPress SMTP and Email Log Plugin plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 2.3.0. This is due to plugin providing the SMTP password in the SMTP Password field when viewing the settings. This makes it possible for authenticated attackers, with administrative-level access and above, to view the SMTP password for the supplied server. Although this would not be useful for attackers in most cases, if an administrator account becomes compromised this could be useful information to an attacker in a limited environment."
},
{
"lang": "es",
"value": "El complemento Easy WP SMTP de SendLayer \u2013 WordPress SMTP y Email Log Plugin para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 2.3.0 incluida. Esto se debe al complemento que proporciona la contrase\u00f1a SMTP en el campo Contrase\u00f1a SMTP al visualizar la configuraci\u00f3n. Esto hace posible que atacantes autenticados, con acceso de nivel administrativo y superior, vean la contrase\u00f1a SMTP del servidor proporcionado. Aunque esto no ser\u00eda \u00fatil para los atacantes en la mayor\u00eda de los casos, si una cuenta de administrador se ve comprometida, esta podr\u00eda ser informaci\u00f3n \u00fatil para un atacante en un entorno limitado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-ecommerce:easy_wp_smtp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.1",
"matchCriteriaId": "D2C2FAB5-F1DF-4EBB-9E6A-D323BCAEAA69"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3101553%40easy-wp-smtp&new=3101553%40easy-wp-smtp&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b043197c-4477-4663-abb8-5840173c574d?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}