2024-12-15 03:03:56 +00:00

131 lines
4.3 KiB
JSON

{
"id": "CVE-2021-24375",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-07-06T11:15:08.713",
"lastModified": "2024-11-21T05:52:56.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Lack of authentication or validation in motor_load_more, motor_gallery_load_more, motor_quick_view and motor_project_quick_view AJAX handlers of the Motor WordPress theme before 3.1.0 allows an unauthenticated attacker access to arbitrary files in the server file system, and to execute arbitrary php scripts found on the server file system. We found no vulnerability for uploading files with this theme, so any scripts to be executed must already be on the server file system."
},
{
"lang": "es",
"value": "Una falta de autenticaci\u00f3n o comprobaci\u00f3n en los controladores AJAX de las funciones motor_load_more, motor_gallery_load_more, motor_quick_view y motor_project_quick_view del tema Motor WordPress versiones anteriores a 3.1.0 permite a un atacante no autenticado acceder a archivos arbitrarios en el sistema de archivos del servidor, y ejecutar scripts php arbitrarios encontrados en el sistema de archivos del servidor. No hemos encontrado ninguna vulnerabilidad para la carga de archivos con este tema, por lo que cualquier script que sea ejecutado debe estar ya en el sistema de archivos del servidor"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stockware:motor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.0",
"matchCriteriaId": "45DF4910-242D-433F-AD87-ECB3260AA17A"
}
]
}
]
}
],
"references": [
{
"url": "https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://jetpack.com/2021/06/09/motor-wordpress-theme-vulnerabilities/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/d9518429-79d3-4b13-88ff-3722d05efa9f",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}