2024-12-08 03:06:42 +00:00

64 lines
2.6 KiB
JSON

{
"id": "CVE-2024-9223",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-23T04:15:10.037",
"lastModified": "2024-11-23T04:15:10.037",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPDash Notes plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wp_ajax_post_it_list_comment' function in all versions up to, and including, 1.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view comments on any post, including private and password protected posts, and pending and draft posts if they were previously published. The vulnerability was partially patched in version 1.3.5."
},
{
"lang": "es",
"value": "El complemento WPDash Notes para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de comprobaci\u00f3n de capacidad en la funci\u00f3n 'wp_ajax_post_it_list_comment' en todas las versiones hasta la 1.3.5 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, vean los comentarios en cualquier publicaci\u00f3n, incluidas las publicaciones privadas y protegidas con contrase\u00f1a, y las publicaciones pendientes y en borrador si se publicaron previamente. La vulnerabilidad fue parcialmente corregida en la versi\u00f3n 1.3.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wpdash-notes/trunk/classes/plugin.php#L210",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58f048e5-f4be-4452-8fed-16871f4020b6?source=cve",
"source": "security@wordfence.com"
}
]
}