Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-1001000

Опубликовано: 03 апр. 2017
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Высокий

Описание

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:wordpress:wordpress:4.7:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:4.7.2:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.80371
Высокий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

CVSS3: 7.5
debian
около 8 лет назад

The register_routes function in wp-includes/rest-api/endpoints/class-w ...

CVSS3: 7.5
github
около 3 лет назад

The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.

EPSS

Процентиль: 99%
0.80371
Высокий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

NVD-CWE-noinfo