Show plain JSON{"id": "CVE-2018-1000509", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2018-06-26T16:29:00.820", "references": [{"url": "https://advisories.dxw.com/advisories/unserialization-redirection/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://advisories.dxw.com/advisories/unserialization-redirection/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-502"}]}], "descriptions": [{"lang": "en", "value": "Redirection version 2.7.1 contains a Serialisation vulnerability possibly allowing ACE vulnerability in Settings page AJAX that can result in could allow admin to execute arbitrary code in some circumstances. This attack appear to be exploitable via Attacker must have access to admin account. This vulnerability appears to have been fixed in 2.8."}, {"lang": "es", "value": "La versi\u00f3n 2.7.1 de Redirection contiene una vulnerabilidad de serializaci\u00f3n que podr\u00eda permitir una vulnerabilidad ACE en la p\u00e1gina AJAX de Settings que puede resultar en que un administrador pueda ejecutar c\u00f3digo arbitrario en algunas circunstancias. Para explotar este ataque, el atacante debe tener acceso a la cuenta de administrador. La vulnerabilidad parece haber sido solucionada en la versi\u00f3n 2.8."}], "lastModified": "2024-11-21T03:40:04.760", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:redirection:redirection:2.7.1:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "485B5B83-C4BA-4EB0-A946-1438FCEBAA39"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}