2024-07-14 02:06:08 +00:00

52 lines
2.4 KiB
JSON

{
"id": "CVE-2024-6000",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-15T04:15:14.313",
"lastModified": "2024-06-17T12:42:04.623",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The FooEvents for WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary file uploads due to an improper capability setting on the 'display_ticket_themes_page' function in versions up to, and including, 1.19.20. This makes it possible for authenticated attackers with contributor-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This was partially patched in 1.19.20, and fully patched in 1.19.21."
},
{
"lang": "es",
"value": "El complemento FooEvents para WooCommerce para WordPress es vulnerable a cargas de archivos arbitrarias no autorizadas debido a una configuraci\u00f3n de capacidad incorrecta en la funci\u00f3n 'display_ticket_themes_page' en versiones hasta la 1.19.20 incluida. Esto hace posible que atacantes autenticados con capacidades de nivel de colaborador o superior carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo. Esto fue parcheado parcialmente en 1.19.20 y completamente parcheado en 1.19.21."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://help.fooevents.com/docs/topics/changelogs/fooevents-for-woocommerce/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1080810b-ec9a-44fb-b4da-49b28646a441?source=cve",
"source": "security@wordfence.com"
}
]
}