2024-10-10 14:03:23 +00:00

64 lines
2.9 KiB
JSON

{
"id": "CVE-2024-8943",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-08T09:15:19.343",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LatePoint plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.0.12. This is due to insufficient verification on the user being supplied during the booking customer step. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. Note that logging in as a WordPress user is only possible if the \"Use WordPress users as customers\" setting is enabled, which is disabled by default. The vulnerability is partially patched in version 5.0.12 and fully patched in version 5.0.13."
},
{
"lang": "es",
"value": "El complemento LatePoint para WordPress es vulnerable a la omisi\u00f3n de la autenticaci\u00f3n en versiones hasta la 5.0.12 incluida. Esto se debe a una verificaci\u00f3n insuficiente del usuario que se proporciona durante el paso de reserva del cliente. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al ID de usuario. Tenga en cuenta que iniciar sesi\u00f3n como usuario de WordPress solo es posible si est\u00e1 habilitada la configuraci\u00f3n \"Usar usuarios de WordPress como clientes\", que est\u00e1 deshabilitada de forma predeterminada. La vulnerabilidad est\u00e1 parcialmente corregida en la versi\u00f3n 5.0.12 y completamente corregida en la versi\u00f3n 5.0.13."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://wpdocs.latepoint.com/changelog/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bac8c35b-2afa-4347-b86e-2f16db19a4d3?source=cve",
"source": "security@wordfence.com"
}
]
}