mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
136 lines
4.3 KiB
JSON
136 lines
4.3 KiB
JSON
{
|
|
"id": "CVE-2013-2697",
|
|
"sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
|
|
"published": "2013-04-19T11:44:26.747",
|
|
"lastModified": "2025-04-11T00:51:21.963",
|
|
"vulnStatus": "Deferred",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site request forgery (CSRF) vulnerability in the WP-DownloadManager plugin before 1.61 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de falsificaci\u00f3n de peticiones en sitios cruzados (CSRF) en el complemento WP-DownloadManager antes de v1.61 para Wordress, permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios de su elecci\u00f3n para peticiones que insertan secuencias XSS."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"baseScore": 6.8,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lester_chan:wp-downloadmanager:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "1.60",
|
|
"matchCriteriaId": "B4FAF020-7F0D-4B05-95F0-C930173A225A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lester_chan:wp-downloadmanager:1.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A25723E-85F8-49DF-AC82-D93BF442C8AA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lester_chan:wp-downloadmanager:1.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DCB9E593-9DEC-4055-9C57-241D329DE0CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lester_chan:wp-downloadmanager:1.31:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AF1422F8-6FE0-4C8E-BAF0-557117F4783B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lester_chan:wp-downloadmanager:1.40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78C619A5-3DDB-44BA-AEA4-176AB5D30546"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:lester_chan:wp-downloadmanager:1.50:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72738FA5-5010-4DA4-BA44-AC901D8F3DFA"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://secunia.com/advisories/52863",
|
|
"source": "PSIRT-CNA@flexerasoftware.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://wordpress.org/extend/plugins/wp-downloadmanager/changelog/",
|
|
"source": "PSIRT-CNA@flexerasoftware.com"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/52863",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://wordpress.org/extend/plugins/wp-downloadmanager/changelog/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |