Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5487

Опубликовано: 15 янв. 2017
Источник: debian
EPSS Критический

Описание

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed4.7.1+dfsg-1package
wordpressnot-affectedjessiepackage
wordpressnot-affectedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2017/01/14/1

  • https://wpvulndb.com/vulnerabilities/8715

  • https://github.com/WordPress/WordPress/commit/daf358983cc1ce0c77bf6d2de2ebbb43df2add60

EPSS

Процентиль: 100%
0.92436
Критический

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 8 лет назад

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.

CVSS3: 5.3
nvd
больше 8 лет назад

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.

CVSS3: 5.3
github
около 3 лет назад

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.

EPSS

Процентиль: 100%
0.92436
Критический