This vulnerability has been customized since it was last examined by the NVD. It is awaiting reanalysis which might result in further modifications to the details offered.
Present Description
WordPress prior to 5.1.1 does not properly filter comment content, causing Remote Code Execution by unauthenticated users in a default setup. This happens because CSRF security is mishandled, and due to the fact that Seo of An elements is carried out improperly, resulting in XSS. The XSS results in administrative access, which enables arbitrary changes to.php files. This is associated to wp-admin/includes/ajax-actions. php and wp-includes/comment. php.
Source:
MITRE
Description Last Modified:
03/14/2019
View Analysis Description
Analysis Description.
WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This takes place due to the fact that CSRF protection is mishandled, and due to the fact that Seo of An aspects is performed improperly, leading to XSS. The XSS results in administrative access, which permits arbitrary modifications to.php files. This relates to wp-admin/includes/ajax-actions. php and wp-includes/comment. php.
Source:
MITRE
Description Last Modified:
03/14/2019
Impact
CVSS v3.0 Severity and Metrics:
Base Score:.
Vector:.
AV: N/AC: L/PR: N/UI: R/S: U/C: H/I: H/A: H.
( V3 legend).
Impact Rating:.
5.9.
Exploitability Score:.
2.8.
Attack Vector (AV):.
Network.
Attack Complexity (AC):.
Low.
Benefits Needed (PR):.
None.
User Interaction (UI):.
Required.
Scope (S):.
Unchanged.
Privacy (C):.
High.
Stability (I):.
High.
Availability (A):.
High.
CVSS v2.0 Intensity and Metrics:
Base Rating:.
Vector:
( AV: N/AC: M/Au: N/C:P/ I:P/ A:P).
( V2 legend).
Impact Subscore:
6.4.
Exploitability Subscore:
8.6.
Gain Access To Vector (AV):.
Network.
Access Intricacy (Air Conditioner):.
Medium.
Authentication (AU):.
None.
Privacy (C):.
Partial.
Stability (I):.
Partial.
Availability (A):.
Partial.
Extra Information:.
Victim must voluntarily connect with attack mechanism
Enables unapproved disclosure of info
Enables unapproved adjustment
Permits disruption of service
References to Advisories, Solutions, and Tools
By choosing these links, you will be leaving NIST webspace. We have offered these links to other web sites due to the fact that.
they may have information that would be of interest to you. No inferences must be made use of account of other websites.
being referenced, or not, from this page. There may be other website that are more proper for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the realities provided on these websites. Even more,.
NIST does not endorse any industrial items that may be mentioned on these sites. Please attend to comments about.
this page to [email protected]
Modification History
3 modification records found.
– reveal changes
CVE Customized by MITRE -.
3/21/201912: 01: 17 PM
Action | Type | Old Worth | New Value |
---|---|---|---|
Added | Recommendation |
https://wpvulndb.com/vulnerabilities/9230[No Types Assigned] |
Initial Analysis -.
3/15/201910: 48: 21 AM
Action | Type | Old Value | New Worth |
---|---|---|---|
Added | CPE Configuration |
OR. * cpe:2.3: a: wordpress: wordpress: *: *: *: *: *: *: *: * variations approximately (omitting) 5.1.1 |
|
Added | CVSS V2 |
( AV: N/AC: M/Au: N/C:P/ I:P/ A:P) |
|
Included | CVSS V2 Metadata |
Victim should voluntarily communicate with attack mechanism |
|
Added | CVSS V3 |
AV: N/AC: L/PR: N/UI: R/S: U/C: H/I: H/A: H |
|
Added | CWE |
CWE-352 |
|
Altered | Reference Type |
http://www.securityfocus.com/bid/107411 No Types Assigned |
http://www.securityfocus.com/bid/107411 3rd Party Advisory, VDB Entry |
Changed | Recommendation Type |
https://blog.ripstech.com/2019/ wordpress-csrf-to-rce/ No Types Assigned |
https://blog.ripstech.com/2019/ wordpress-csrf-to-rce/ Make use of, Third Celebration Advisory |
Altered | Referral Type |
https://github.com/WordPress/WordPress/commit/0292 de60 ec78 c5a44956765189403654 fe4d080 b No Types Assigned |
https://github.com/WordPress/WordPress/commit/0292 de60 ec78 c5a44956765189403654 fe4d080 b Spot, Third Party Advisory |
Changed | Reference Type |
https://wordpress.org/news/2019/03/ wordpress-5-1-1-security-and-maintenance-release/ No Types Assigned |
https://wordpress.org/news/2019/03/ wordpress-5-1-1-security-and-maintenance-release/ Release Notes, Supplier Advisory |
Altered | Recommendation Type |
https://wordpress.org/support/wordpress-version/version-5-1-1/ No Types Assigned |
https://wordpress.org/support/wordpress-version/version-5-1-1/ Release Notes, Vendor Advisory |
CVE Modified by MITRE -.
3/15/2019 6: 29: 19 AM
Action | Type | Old Value | New Value |
---|---|---|---|
Added | Reference |
http://www.securityfocus.com/bid/107411[No Types Assigned] |