2024-12-29 03:03:44 +00:00

64 lines
2.4 KiB
JSON

{
"id": "CVE-2024-12034",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-24T06:15:32.553",
"lastModified": "2024-12-24T06:15:32.553",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Advanced Google reCAPTCHA plugin for WordPress is vulnerable to IP unblocking in all versions up to, and including, 1.25. This is due to the plugin not utilizing a strong unique key when generating an unblock request. This makes it possible for unauthenticated attackers to unblock their IP after being locked out due to too many bad password attempts"
},
{
"lang": "es",
"value": "El complemento Advanced Google reCAPTCHA para WordPress es vulnerable al desbloqueo de IP en todas las versiones hasta la 1.25 incluida. Esto se debe a que el complemento no utiliza una clave \u00fanica segura al generar una solicitud de desbloqueo. Esto hace posible que atacantes no autenticados desbloqueen su IP despu\u00e9s de haber sido bloqueado debido a demasiados intentos de contrase\u00f1a incorrectos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-340"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3208704%40advanced-google-recaptcha&new=3208704%40advanced-google-recaptcha&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0fa7e6f6-92b2-494b-8c7a-76ba8213b610?source=cve",
"source": "security@wordfence.com"
}
]
}