mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
52 lines
2.6 KiB
JSON
52 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-1677",
|
|
"sourceIdentifier": "security@wordfence.com",
|
|
"published": "2024-05-02T17:15:12.130",
|
|
"lastModified": "2024-05-02T18:00:37.360",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Print Labels with Barcodes. Create price tags, product labels, order labels for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to an improper capability check on 42 separate AJAX functions in all versions up to, and including, 3.4.6. This makes it possible for authenticated attackers, with subscriber access and above, to fully control the plugin which includes the ability to modify plugin settings and profiles, and create, edit, retrieve, and delete templates and barcodes."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento Print Labels with Barcodes. Create price tags, product labels, order labels for WooCommerce para WordPress es vulnerable al acceso no autorizado a los datos, a la modificaci\u00f3n de datos y a la p\u00e9rdida de datos debido a una verificaci\u00f3n de capacidad inadecuada en 42 funciones AJAX separadas en todas las versiones hasta, e incluyendo, 3.4.6. Esto hace posible que los atacantes autenticados, con acceso de suscriptor y superior, controlen completamente el complemento, lo que incluye la capacidad de modificar la configuraci\u00f3n y los perfiles del complemento, y crear, editar, recuperar y eliminar plantillas y c\u00f3digos de barras."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@wordfence.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 6.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 3.4
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/browser/a4-barcode-generator/trunk/class/Request.php?rev=2870656",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e15d285-aa1d-461d-bdc2-642e7ccd789b?source=cve",
|
|
"source": "security@wordfence.com"
|
|
}
|
|
]
|
|
} |