2024-12-08 03:06:42 +00:00

131 lines
4.5 KiB
JSON

{
"id": "CVE-2019-12517",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-09-13T13:15:11.260",
"lastModified": "2024-11-21T04:23:00.907",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An XSS issue was discovered in the slickquiz plugin through 1.3.7.1 for WordPress. The save_quiz_score functionality available via the /wp-admin/admin-ajax.php endpoint allows unauthenticated users to submit quiz solutions/answers, which are stored in the database and later shown in the WordPress backend for all users with at least Subscriber rights. Because the plugin does not properly validate and sanitize this data, a malicious payload in either the name or email field is executed directly within the backend at /wp-admin/admin.php?page=slickquiz across all users with the privileges of at least Subscriber."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de tipo XSS en el plugin slickquiz versiones hasta 1.3.7.1 para WordPress. La funcionalidad save_quiz_score disponible por medio del end point del archivo /wp-admin/admin-ajax.php permite a usuarios no autenticados enviar prueba de soluciones/respuestas, que son almacenados en la base de datos y luego se muestran en el backend de WordPress para todos usuarios con al menos derechos de Subscriber. Debido a que el plugin no comprueba y sanea apropiadamente estos datos, una carga maliciosa en el campo name o email es ejecutada directamente dentro del backend en /wp-admin/admin.php?page=slickquiz a trav\u00e9s de todos usuarios con privilegios de al menos Subscriber."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:slickquiz_project:slickquiz:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.7.1",
"matchCriteriaId": "D2602D05-E15E-4E5F-883E-FD89628961DF"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-Site-Scripting.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://wordpress.org/plugins/slickquiz/#developers",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-Site-Scripting.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://wordpress.org/plugins/slickquiz/#developers",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}