René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
3.5 KiB
JSON

{
"id": "CVE-2021-24181",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-04-05T19:15:16.390",
"lastModified": "2021-04-09T16:30:54.703",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The tutor_mark_answer_as_correct AJAX action from the Tutor LMS \u00e2\u20ac\u201c eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students."
},
{
"lang": "es",
"value": "La acci\u00f3n AJAX tutor_mark_answer_as_correct del plugin de WordPress Tutor LMS \u00e2\u20ac\" eLearning and online course solution versi\u00f3n anteriores a 1.7.7, era vulnerable a inyecciones SQL ciegas y basadas en tiempo que podr\u00edan ser explotadas por estudiantes"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.7",
"matchCriteriaId": "7AD21F1B-94BF-4BD3-AF90-8D3310510363"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/d5a00322-7098-4f8d-8e5e-157b63449c17",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/blog/2021/03/several-vulnerabilities-patched-in-tutor-lms-plugin/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}