Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1001000

Опубликовано: 03 апр. 2017
Источник: debian
EPSS Высокий

Описание

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed4.7.2+dfsg-1package
wordpressnot-affectedjessiepackage
wordpressnot-affectedwheezypackage

Примечания

  • https://github.com/WordPress/WordPress/commit/e357195ce303017d517aff944644a7a1232926f7

  • rest-api introduced in 4.4 upstream

EPSS

Процентиль: 99%
0.80371
Высокий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

CVSS3: 7.5
nvd
около 8 лет назад

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

CVSS3: 7.5
github
около 3 лет назад

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

EPSS

Процентиль: 99%
0.80371
Высокий