René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

120 lines
4.2 KiB
JSON

{
"id": "CVE-2021-24410",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-08-16T11:15:08.147",
"lastModified": "2023-03-01T18:58:36.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The \u00e0\u00b0\u00a4\u00e0\u00b1\u2020\u00e0\u00b0\u00b2\u00e0\u00b1?\u00e0\u00b0\u2014\u00e0\u00b1? \u00e0\u00b0\u00ac\u00e0\u00b1\u02c6\u00e0\u00b0\u00ac\u00e0\u00b0\u00bf\u00e0\u00b0\u00b2\u00e0\u00b1? \u00e0\u00b0\u00b5\u00e0\u00b0\u0161\u00e0\u00b0\u00a8\u00e0\u00b0\u00ae\u00e0\u00b1?\u00e0\u00b0\u00b2\u00e0\u00b1? WordPress plugin through 1.0 is lacking any CSRF check when saving its settings and verses, and do not sanitise or escape them when outputting them back in the page. This could allow attackers to make a logged in admin change the settings, as well as add malicious verses containing JavaScript code in them, leading to Stored XSS issues"
},
{
"lang": "es",
"value": "El \u00e0\u00b0\u00a4\u00e0\u00b1\u2020\u00e0\u00b0\u00b2\u00e0\u00b1?\u00e0\u00b0-\u00e0\u00b1? \u00e0\u00b0\u00ac\u00e0\u00b1\u02c6\u00e0\u00b0\u00ac\u00e0\u00b0\u00bf\u00e0\u00b0\u00b2\u00e0\u00b1? \u00e0\u00b0\u00b5\u00e0\u00b0\u0161\u00e0\u00b0\u00a8\u00e0\u00b0\u00ae\u00e0\u00b1?\u00e0\u00b0\u00b2\u00e0\u00b1? El plugin de WordPress a trav\u00e9s de la versi\u00f3n 1.0 carece de cualquier comprobaci\u00f3n de CSRF al guardar sus configuraciones y versos, y no los sanea o escapa al devolverlos a la p\u00e1gina. Esto podr\u00eda permitir a los atacantes hacer que un administrador conectado cambie la configuraci\u00f3n, as\u00ed como a\u00f1adir versos maliciosos que contengan c\u00f3digo JavaScript en ellos, llevando a problemas de XSS almacenado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:telugu_bible_verse_daily_project:telugu_bible_verse_daily:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "7A5956F3-1D85-4F3E-9A9B-70393402E69A"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/b47ea36e-f37c-4745-b750-31f5b91f543f",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}