René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

125 lines
4.5 KiB
JSON

{
"id": "CVE-2022-1750",
"sourceIdentifier": "security@wordfence.com",
"published": "2022-06-13T14:15:08.637",
"lastModified": "2022-06-21T20:51:17.150",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Sticky Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018 popup_title' parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin level capabilities and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue mostly affects sites where unfiltered_html has been disabled for administrators and on multi-site installations where unfiltered_html is disabled for administrators."
},
{
"lang": "es",
"value": "El plugin Sticky Popup para WordPress es vulnerable a un ataque e tipo Cross-Site Scripting Almacenado por medio del par\u00e1metro \" popup_title\" en versiones hasta la 1.2 incluy\u00e9ndola, debido a una saneo insuficiente de la entrada y escape de la salida. Esto hace posible que atacantes autenticados, con capacidades de nivel de administrador y superiores, inyecten scripts web arbitrarios en las p\u00e1ginas que ser\u00e1n ejecutadas cada vez que un usuario acceda a una p\u00e1gina inyectada. Este problema afecta sobre todo a los sitios en los que ha sido deshabilitado unfiltered_html para los administradores y en las instalaciones multisitio en las que ha sido deshabilitado unfiltered_html para los administradores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sticky_popup_project:sticky_popup:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2",
"matchCriteriaId": "DF057E27-C381-416F-AF92-FD2B52F72A55"
}
]
}
]
}
],
"references": [
{
"url": "https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1750",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}