René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
3.7 KiB
JSON

{
"id": "CVE-2021-24487",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-10-25T14:15:10.093",
"lastModified": "2023-02-15T02:30:50.630",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The St-Daily-Tip WordPress plugin through 4.7 does not have any CSRF check in place when saving its 'Default Text to Display if no tips' setting, and was also lacking sanitisation as well as escaping before outputting it the page. This could allow attacker to make logged in administrators set a malicious payload in it, leading to a Stored Cross-Site Scripting issue"
},
{
"lang": "es",
"value": "El plugin St-Daily-Tip de WordPress versiones hasta 4.7, no presenta ninguna comprobaci\u00f3n de CSRF cuando guarda su configuraci\u00f3n de \"Default Text to Display if no tips\", y tambi\u00e9n carece de saneo, as\u00ed como de escape antes de la salida de la p\u00e1gina. Esto podr\u00eda permitir a un atacante hacer que los administradores conectados establezcan una carga \u00fatil maliciosa en ella, conllevando a un problema de tipo Cross-Site Scripting Almacenado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sanskruti:st-daily-tip:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.7",
"matchCriteriaId": "D5771427-8CA0-47AC-91A5-F60234B6A798"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/def352f8-1bbe-4263-ad1a-1486140269f4",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}