Show plain JSON{"id": "CVE-2013-3477", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2014-05-27T14:55:10.073", "references": [{"url": "http://secunia.com/advisories/53321", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://wordpress.org/plugins/related-posts-by-zemanta/changelog/", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://www.securityfocus.com/bid/59840", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84246", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://secunia.com/advisories/53321", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://wordpress.org/plugins/related-posts-by-zemanta/changelog/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/59840", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84246", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Related Posts by Zemanta plugin before 1.3.2 for WordPress allows remote attackers to hijack the authentication of unspecified users for requests that change settings via unknown vectors."}, {"lang": "es", "value": "Vulnerabilidad de CSRF en el plugin Related Posts By Zemanta anterior a 1.3.2 para WordPress permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios no especificados para solicitudes que cambian configuraciones a trav\u00e9s de vectores desconocidos."}], "lastModified": "2024-11-21T01:53:42.180", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:zemanta:related_posts:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "56BB915F-CB91-493C-BDBD-0CA3C75EEFCD", "versionEndIncluding": "1.3.1"}, {"criteria": "cpe:2.3:a:zemanta:related_posts:1.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "D7774D9E-549A-4240-B5DA-98EA0C06127B"}, {"criteria": "cpe:2.3:a:zemanta:related_posts:1.1:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "71E49B56-6FF5-4668-AF0F-47CD3B1D0D6B"}, {"criteria": "cpe:2.3:a:zemanta:related_posts:1.2:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "820277FA-4C3B-48CA-B19A-FB3914FE7D77"}, {"criteria": "cpe:2.3:a:zemanta:related_posts:1.3:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "3AE14921-E43A-4BA4-8444-12F209E68929"}], "operator": "OR"}]}], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com"}