René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

130 lines
4.0 KiB
JSON

{
"id": "CVE-2021-24162",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-04-05T19:15:15.233",
"lastModified": "2021-04-08T19:10:16.720",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site."
},
{
"lang": "es",
"value": "En los plugins de WordPress Reponsive Menu (free y Pro) versiones anteriores a 4.0.4, los atacantes pod\u00edan dise\u00f1ar una petici\u00f3n y enga\u00f1ar a un administrador para que importara todas las configuraciones nuevas. Esta configuraci\u00f3n podr\u00eda modificarse para incluir JavaScript malicioso, lo que permitir\u00eda a un atacante inyectar cargas \u00fatiles que podr\u00edan ayudar en una mayor infecci\u00f3n del sitio"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "4.0.4",
"matchCriteriaId": "36CF966E-25C0-408C-A993-0FAF0AF9FC31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:expresstech:responsive_menu:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "4.0.4",
"matchCriteriaId": "B045BC14-6B45-4707-B41C-D1447BBECE04"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/923fc3a3-4bcc-4b48-870a-6150e14509b5",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/blog/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}