2024-01-23 19:00:30 +00:00

81 lines
2.4 KiB
JSON

{
"id": "CVE-2022-1617",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-16T16:15:09.583",
"lastModified": "2024-01-23T18:59:15.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The WP-Invoice WordPress plugin through 4.3.1 does not have CSRF check in place when updating its settings, and is lacking sanitisation as well as escaping in some of them, allowing attacker to make a logged in admin change them and add XSS payload in them"
},
{
"lang": "es",
"value": "El complemento de WordPress WP-Invoice hasta la versi\u00f3n 4.3.1 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, y carece de sanitizaci\u00f3n, adem\u00e1s de escaparse en algunas de ellas, lo que permite al atacante hacer que un administrador que haya iniciado sesi\u00f3n las cambie y agregue un payload XSS. a ellos"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:usabilitydynamics:wp-invoice:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.3.1",
"matchCriteriaId": "CCD5516A-1F0C-4E5C-BC7A-4C488D301D84"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7e40e506-ad02-44ca-9d21-3634f3907aad/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}