mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
80 lines
4.2 KiB
JSON
80 lines
4.2 KiB
JSON
{
|
|
"id": "CVE-2024-10783",
|
|
"sourceIdentifier": "security@wordfence.com",
|
|
"published": "2024-12-13T10:15:06.400",
|
|
"lastModified": "2024-12-13T10:15:06.400",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The MainWP Child \u2013 Securely Connects to the MainWP Dashboard to Manage Multiple Sites plugin for WordPress is vulnerable to privilege escalation due to a missing authorization checks on the register_site function in all versions up to, and including, 5.2 when a site is left in an unconfigured state. This makes it possible for unauthenticated attackers to log in as an administrator on instances where MainWP Child is not yet connected to the MainWP Dashboard. IMPORTANT: this only affects sites who have MainWP Child installed and have not yet connected to the MainWP Dashboard, and do not have the unique security ID feature enabled. Sites already connected to the MainWP Dashboard plugin and do not have the unique security ID feature enabled, are NOT affected and not required to upgrade. Please note 5.2.1 contains a partial patch, though we consider 5.3 to be the complete patch."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento MainWP Child \u2013 Securely Connects to the MainWP Dashboard to Manage Multiple Sites para WordPress es vulnerable a la escalada de privilegios debido a la falta de comprobaciones de autorizaci\u00f3n en la funci\u00f3n register_site en todas las versiones hasta la 5.2 incluida cuando un sitio se deja en un estado no configurado. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como administradores en instancias en las que MainWP Child a\u00fan no est\u00e1 conectado al Panel de control de MainWP. IMPORTANTE: esto solo afecta a los sitios que tienen MainWP Child instalado y a\u00fan no se han conectado al Panel de control de MainWP, y no tienen habilitada la funci\u00f3n de ID de seguridad \u00fanica. Los sitios que ya est\u00e1n conectados al complemento MainWP Dashboard y no tienen habilitada la funci\u00f3n de ID de seguridad \u00fanica NO se ven afectados y no es necesario actualizarlos. Tenga en cuenta que la versi\u00f3n 5.2.1 contiene un parche parcial, aunque consideramos que la versi\u00f3n 5.3 es el parche completo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@wordfence.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.2,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security@wordfence.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-child.php#L76",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L69",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/browser/mainwp-child/tags/5.2/class/class-mainwp-connect.php#L788",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197586%40mainwp-child&new=3197586%40mainwp-child&sfp_email=&sfph_mail=",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://wordpress.org/plugins/mainwp-child/",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9156e536-a58e-4d78-b136-af8a9613ee23?source=cve",
|
|
"source": "security@wordfence.com"
|
|
}
|
|
]
|
|
} |