René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

153 lines
5.3 KiB
JSON

{
"id": "CVE-2015-9511",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-10-23T17:15:11.350",
"lastModified": "2021-10-26T16:26:03.873",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Easy Digital Downloads (EDD) Conditional Success Redirects extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused."
},
{
"lang": "es",
"value": "La extensi\u00f3n Conditional Success Redirects de Easy Digital Downloads (EDD) para WordPress, como es usada con EDD versiones 1.8.x anteriores a 1.8.7, versiones 1.9.x anteriores a 1.9.10, versiones 2.0.x anteriores a 2.0.5, versiones 2.1.x anteriores a 2.1.11, versiones 2.2.x anteriores a 2.2.9, y versiones 2.3.x anteriores a 2.3.7, presenta una vulnerabilidad de tipo XSS porque el par\u00e1metro add_query_arg es usado inapropiadamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"versionStartIncluding": "1.8",
"versionEndExcluding": "1.8.7",
"matchCriteriaId": "5B0E93EB-51AD-4908-A0F7-278D8FCC357C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"versionStartIncluding": "1.9",
"versionEndExcluding": "1.9.10",
"matchCriteriaId": "19864887-186E-4AB4-A3DB-0E19CC54D1B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"versionStartIncluding": "2.0",
"versionEndExcluding": "2.0.5",
"matchCriteriaId": "7F7B70D9-D15C-4CE5-ABEB-E0D6D8D3A5E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"versionStartIncluding": "2.1",
"versionEndExcluding": "2.1.11",
"matchCriteriaId": "79B82F4F-8A45-4698-B44D-71E3C8813650"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"versionStartIncluding": "2.2",
"versionEndExcluding": "2.2.9",
"matchCriteriaId": "5812C4D7-838E-494D-8943-B5454B8E0E08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
"versionStartIncluding": "2.3",
"versionEndExcluding": "2.3.7",
"matchCriteriaId": "5297EF5F-FC3C-4BB3-94FB-EEDE83FF74AF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easydigitaldownloads:conditional_success_redirects:-:*:*:*:*:easy_digital_downloads:*:*",
"matchCriteriaId": "1D58F0DF-FD1E-4F30-A39A-DB585F58FDB8"
}
]
}
]
}
],
"references": [
{
"url": "https://web.archive.org/web/20160921003517/https://easydigitaldownloads.com/blog/security-fix-released/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}