mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
120 lines
4.2 KiB
JSON
120 lines
4.2 KiB
JSON
{
|
|
"id": "CVE-2021-24410",
|
|
"sourceIdentifier": "contact@wpscan.com",
|
|
"published": "2021-08-16T11:15:08.147",
|
|
"lastModified": "2023-03-01T18:58:36.647",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The \u00e0\u00b0\u00a4\u00e0\u00b1\u2020\u00e0\u00b0\u00b2\u00e0\u00b1?\u00e0\u00b0\u2014\u00e0\u00b1? \u00e0\u00b0\u00ac\u00e0\u00b1\u02c6\u00e0\u00b0\u00ac\u00e0\u00b0\u00bf\u00e0\u00b0\u00b2\u00e0\u00b1? \u00e0\u00b0\u00b5\u00e0\u00b0\u0161\u00e0\u00b0\u00a8\u00e0\u00b0\u00ae\u00e0\u00b1?\u00e0\u00b0\u00b2\u00e0\u00b1? WordPress plugin through 1.0 is lacking any CSRF check when saving its settings and verses, and do not sanitise or escape them when outputting them back in the page. This could allow attackers to make a logged in admin change the settings, as well as add malicious verses containing JavaScript code in them, leading to Stored XSS issues"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El \u00e0\u00b0\u00a4\u00e0\u00b1\u2020\u00e0\u00b0\u00b2\u00e0\u00b1?\u00e0\u00b0-\u00e0\u00b1? \u00e0\u00b0\u00ac\u00e0\u00b1\u02c6\u00e0\u00b0\u00ac\u00e0\u00b0\u00bf\u00e0\u00b0\u00b2\u00e0\u00b1? \u00e0\u00b0\u00b5\u00e0\u00b0\u0161\u00e0\u00b0\u00a8\u00e0\u00b0\u00ae\u00e0\u00b1?\u00e0\u00b0\u00b2\u00e0\u00b1? El plugin de WordPress a trav\u00e9s de la versi\u00f3n 1.0 carece de cualquier comprobaci\u00f3n de CSRF al guardar sus configuraciones y versos, y no los sanea o escapa al devolverlos a la p\u00e1gina. Esto podr\u00eda permitir a los atacantes hacer que un administrador conectado cambie la configuraci\u00f3n, as\u00ed como a\u00f1adir versos maliciosos que contengan c\u00f3digo JavaScript en ellos, llevando a problemas de XSS almacenado"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "contact@wpscan.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-352"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:telugu_bible_verse_daily_project:telugu_bible_verse_daily:*:*:*:*:*:wordpress:*:*",
|
|
"versionEndIncluding": "1.0",
|
|
"matchCriteriaId": "7A5956F3-1D85-4F3E-9A9B-70393402E69A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://wpscan.com/vulnerability/b47ea36e-f37c-4745-b750-31f5b91f543f",
|
|
"source": "contact@wpscan.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |