René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

121 lines
3.7 KiB
JSON

{
"id": "CVE-2019-12826",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-07-01T18:15:11.740",
"lastModified": "2019-07-31T08:15:11.583",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site-Request-Forgery (CSRF) vulnerability in widget_logic.php in the 2by2host Widget Logic plugin before 5.10.2 for WordPress allows remote attackers to execute PHP code via snippets (that are attached to widgets and then eval'd to dynamically determine their visibility) by crafting a malicious POST request that tricks administrators into adding the code."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Request Forgery (CSRF) en widget_logic.php en el plugin 2by2host Widget Logic en versiones anteriores a la 5.10.2 para WordPress permite a atacantes remotos ejecutar c\u00f3digo PHP mediante snippets (que se adjuntan a los widgets y luego se eval\u00faan din\u00e1micamente para determinar su visibilidad) creando una solicitud POST maliciosa que enga\u00f1e a los administradores para que agreguen el c\u00f3digo."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpchef:widget_logic:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.10.2",
"matchCriteriaId": "416E0D99-BB05-40C0-BA2B-EC0622023518"
}
]
}
]
}
],
"references": [
{
"url": "https://dannewitz.ninja/posts/widget-logic-csrf-to-rce",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/2112753/widget-logic",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wpvulndb.com/vulnerabilities/9403",
"source": "cve@mitre.org"
},
{
"url": "https://wpvulndb.com/vulnerabilities/9413",
"source": "cve@mitre.org"
}
]
}