2024-12-08 03:06:42 +00:00

78 lines
2.7 KiB
JSON

{
"id": "CVE-2023-3510",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-09-11T20:15:10.040",
"lastModified": "2024-11-21T08:17:25.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The FTP Access WordPress plugin through 1.0 does not have authorisation and CSRF checks when updating its settings and is missing sanitisation as well as escaping in them, allowing any authenticated users, such as subscriber to update them with XSS payloads, which will be triggered when an admin will view the settings of the plugin. The attack could also be perform via CSRF against any authenticated user."
},
{
"lang": "es",
"value": "El complemento FTP Access WordPress hasta la versi\u00f3n 1.0 no tiene autorizaci\u00f3n ni verificaciones CSRF al actualizar su configuraci\u00f3n y le falta sanitizaci\u00f3n y escape en ellas, lo que permite a cualquier usuario autenticado, como el suscriptor, actualizarlas con payloads XSS, que se activar\u00e1n cuando un administrador vea la configuraci\u00f3n del complemento. El ataque tambi\u00e9n podr\u00eda realizarse mediante CSRF contra cualquier usuario autenticado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:danialhatami:ftp_access:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "AC66056A-57D6-4DE3-8BE4-7B0F53E80FD0"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/76abf4ac-5cc1-41a0-84c3-dff42c659581",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/76abf4ac-5cc1-41a0-84c3-dff42c659581",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}