mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
52 lines
2.5 KiB
JSON
52 lines
2.5 KiB
JSON
{
|
|
"id": "CVE-2024-6168",
|
|
"sourceIdentifier": "security@wordfence.com",
|
|
"published": "2024-07-09T09:15:09.597",
|
|
"lastModified": "2024-07-09T18:19:14.047",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Just Custom Fields plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation on several AJAX function. This makes it possible for unauthenticated attackers to invoke this functionality intended for admin users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This enables subscribers to manage field groups, change visibility of items among other things."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento Just Custom Fields para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.3.2 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en varias funciones AJAX. Esto hace posible que atacantes no autenticados invoquen esta funcionalidad destinada a usuarios administradores a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Esto permite a los suscriptores administrar grupos de campos, cambiar la visibilidad de los elementos, entre otras cosas."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@wordfence.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://wordpress.org/plugins/just-custom-fields",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d98946e-864f-434e-8f45-85d663bbefee?source=cve",
|
|
"source": "security@wordfence.com"
|
|
}
|
|
]
|
|
} |