mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
69 lines
2.3 KiB
JSON
69 lines
2.3 KiB
JSON
{
|
|
"id": "CVE-2022-4120",
|
|
"sourceIdentifier": "contact@wpscan.com",
|
|
"published": "2022-12-26T13:15:12.437",
|
|
"lastModified": "2023-11-07T03:56:59.093",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2022.6 passes base64 encoded user input to the unserialize() PHP function when CAPTCHA are used as second challenge, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento Stop Spammers Security | Block Spam Users, Comments, Forms de WordPress anterior a 2022.6 pasa la entrada del usuario codificada en base64 a la funci\u00f3n PHP unserialize() cuando se usa CAPTCHA como segundo desaf\u00edo, lo que podr\u00eda llevar a la inyecci\u00f3n de objetos PHP si un complemento instalado en el blog tiene una cadena de gadgets adecuada"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:trumani:stop_spammers:*:*:*:*:*:wordpress:*:*",
|
|
"versionEndExcluding": "2022.6",
|
|
"matchCriteriaId": "99398C54-698C-426E-81AF-AFB0E6333B67"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf",
|
|
"source": "contact@wpscan.com",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |