Show plain JSON{"id": "CVE-2021-24197", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.2, "exploitabilityScore": 2.8}]}, "published": "2021-04-12T14:15:14.710", "references": [{"url": "https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/", "tags": ["Third Party Advisory"], "source": "contact@wpscan.com"}, {"url": "https://wpdatatables.com/help/whats-new-changelog/", "tags": ["Release Notes", "Vendor Advisory"], "source": "contact@wpscan.com"}, {"url": "https://wpscan.com/vulnerability/a56c04a4-dda0-4a7f-a525-d0349a1fda2b", "tags": ["Third Party Advisory"], "source": "contact@wpscan.com"}, {"url": "https://n4nj0.github.io/advisories/wordpress-plugin-wpdatatables-ii/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://wpdatatables.com/help/whats-new-changelog/", "tags": ["Release Notes", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://wpscan.com/vulnerability/a56c04a4-dda0-4a7f-a525-d0349a1fda2b", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "contact@wpscan.com", "description": [{"lang": "en", "value": "CWE-284"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The wpDataTables \u2013 Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to access the data of another user that are present in the same table by taking over the user permissions on the table through formdata[wdt_ID] parameter. By exploiting this issue an attacker is able to access and manage the data of all users in the same table."}, {"lang": "es", "value": "El plugin wpDataTables \u2013 Tables & Table Charts premium WordPress versiones anteriores a 3.4.2, presenta un Control de Acceso Inapropiado. Un usuario autenticado poco privilegiado que visita la p\u00e1gina donde es publicada la tabla puede manipular los par\u00e1metros para acceder a los datos de otro usuario que est\u00e1n presentes en la misma tabla al asumir los permisos de usuario en la tabla por medio del par\u00e1metro formdata[wdt_ID]. Al explotar este problema, un atacante puede acceder y administrar los datos de todos los usuarios en la misma tabla"}], "lastModified": "2024-11-21T05:52:34.473", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tms-outsource:wpdatatables:*:*:*:*:premium:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "00C79193-0FAF-4101-B078-43245C9012E5", "versionEndExcluding": "3.4.2"}], "operator": "OR"}]}], "sourceIdentifier": "contact@wpscan.com"}