René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
3.8 KiB
JSON

{
"id": "CVE-2021-24618",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-09-20T10:15:09.137",
"lastModified": "2022-12-20T22:07:44.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape its QRCode Image setting, which result into a Stored Cross-Site Scripting (XSS). Furthermore, the plugin also does not have any CSRF and capability checks in place when saving such setting, allowing any authenticated user (as low as subscriber), or unauthenticated user via a CSRF vector to update them and perform such attack."
},
{
"lang": "es",
"value": "El plugin Donate con QRCode de WordPress versiones anteriores a 1.4.5 no sanea ni escapa de su configuraci\u00f3n de imagen QRCode, que resulta en un ataque de tipo Cross-Site Scripting (XSS) Almacenado. Adem\u00e1s, el plugin tampoco presenta ninguna comprobaci\u00f3n de CSRF y de capacidad cuando guarda dicha configuraci\u00f3n, permitiendo que cualquier usuario autenticado (por debajo de un suscriptor), o un usuario no autenticado por medio de un vector CSRF pueda actualizarlos y llevar a cabo dicho ataque"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wbolt:donate_with_qrcode:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.5",
"matchCriteriaId": "435CB77B-4731-48FF-BEAE-61232AF404EF"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/d50b801a-16b5-45e9-a465-e3bb0445cb49",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}