mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
192 lines
5.9 KiB
JSON
192 lines
5.9 KiB
JSON
{
|
|
"id": "CVE-2014-9038",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2014-11-25T23:59:09.287",
|
|
"lastModified": "2024-11-21T02:20:08.933",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "wp-includes/http.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to conduct server-side request forgery (SSRF) attacks by referring to a 127.0.0.0/8 resource."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "wp-includes/http.php en WordPress anterior a 3.7.5, 3.8.x anterior a 3.8.5, 3.9.x anterior a 3.9.3, y 4.x anterior a 4.0.1 permite a atacantes remotos realizar ataques de CSRF mediante la referencia a un recurso 127.0.0.0/8."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"baseScore": 6.4,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "3.7.4",
|
|
"matchCriteriaId": "05E4FA51-9B8A-49E4-B6E8-A9799BE216CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F4D38621-9941-4D03-91D7-3902930546A2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.8.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "934CC6A1-D5E4-468C-B31D-F5C7B02FCE6C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.8.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC02EF96-4F17-443C-A739-961EED916C18"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.8.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C631B472-8FF2-4A93-91F1-DCA813A8520A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.8.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57EB9FD7-7922-44A5-BB82-410B33032E59"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC9343FA-182C-4E2E-85ED-13F0B398258A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B79DE40E-BFA7-43DA-AB42-2812FB207941"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:3.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5EED9381-2BFC-4BDA-AC4B-CBC77E8538D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:wordpress:wordpress:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E372A3D2-FCB5-4A74-840D-EC03732FCC97"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://advisories.mageia.org/MGASA-2014-0493.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://openwall.com/lists/oss-security/2014/11/25/12",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2014/dsa-3085",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1031243",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://core.trac.wordpress.org/changeset/30444",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://advisories.mageia.org/MGASA-2014-0493.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://openwall.com/lists/oss-security/2014/11/25/12",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2014/dsa-3085",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:233",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id/1031243",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://core.trac.wordpress.org/changeset/30444",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://wordpress.org/news/2014/11/wordpress-4-0-1/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |