René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

127 lines
4.0 KiB
JSON

{
"id": "CVE-2009-4748",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-03-26T20:30:00.610",
"lastModified": "2017-09-19T01:30:03.533",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in mycategoryorder.php in the My Category Order plugin 2.8 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the parentID parameter in an act_OrderCategories action to wp-admin/post-new.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en mycategoryorder.php en el plugin My Category Order v2.8 y anteriores para WordPress, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro parentID en una acci\u00f3n act_OrderCategories sobre wp-admin/post-new.php."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:andrew_charlton:my_category_order:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.8",
"matchCriteriaId": "FB42535F-5375-4A9E-81A4-1D6B9DAC509D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:andrew_charlton:my_category_order:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8A48F4-863F-453F-B51C-5F840B71C40A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:andrew_charlton:my_category_order:2.6.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE77258-9C35-4F15-85C0-19076BA1E28B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:andrew_charlton:my_category_order:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9987BA6E-36D6-45AA-9ABB-11272D21726E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:andrew_charlton:my_category_order:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF39C70A-7DE1-48EB-94D8-199D55CDCBC3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.org/0907-exploits/wpmco-sql.txt",
"source": "cve@mitre.org"
},
{
"url": "http://www.exploit-db.com/exploits/9150",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/35704",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51727",
"source": "cve@mitre.org"
}
]
}