mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
159 lines
5.4 KiB
JSON
159 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2014-4664",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-11-06T15:55:08.617",
|
|
"lastModified": "2018-10-09T19:49:48.130",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the Wordfence Security plugin before 5.1.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the whoisval parameter on the WordfenceWhois page to wp-admin/admin.php."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de XSS en el plugin Wordfence Security anterior a 5.1.4 para WordPress permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro whoisval en la p\u00e1gina WordfenceWhois en wp-admin/admin.php."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.1:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "4FABB794-F31C-4921-8399-C1093B8B0193"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.2:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "0974D8E8-F6DB-4B81-9705-3331B6F42C4D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.3:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "8C1D0590-B91F-4C7B-AF14-1DAAFBA050F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.4:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "EF747352-2E8B-45A3-B6E1-DCB72B7584FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.5:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "D0A3899D-3437-4C21-8B6C-402F0A2B06B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.6:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "0A37BBD8-FD61-4BF2-8E42-F628BDF0806B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.7:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "E4411998-44D9-4C67-BEED-8916705D114D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.8:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "FDE22AF4-89C2-4BBF-9E8E-BA3375FAFF4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.0.9:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "050AEF81-FEC3-49E1-9C23-2C8B4021DBF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.1.1:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "3DBF5AEF-0EE1-40A6-89E6-95D152CEBE18"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordfence_security_project:wordfence_security:5.1.2:*:*:*:*:wordpress:*:*",
|
|
"matchCriteriaId": "7EF9E46D-4C7A-43D2-8FED-071ABBCEDF0B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://hacktivity.websecgeeks.com/word-press-firewall-plugin-xss/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/533907/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/70911",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/70915",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.wordfence.com/blog/2014/06/security-fix-wordfence-5-1-4/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://wordpress.org/plugins/wordfence/changelog/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |