Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-10148

Опубликовано: 18 янв. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4
CVSS3: 4.3

Описание

The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.

РелизСтатусПримечание
artful

not-affected

4.6.1+dfsg-1
bionic

not-affected

4.6.1+dfsg-1
cosmic

not-affected

4.6.1+dfsg-1
devel

not-affected

4.6.1+dfsg-1
disco

not-affected

4.6.1+dfsg-1
eoan

not-affected

4.6.1+dfsg-1
esm-apps/bionic

not-affected

4.6.1+dfsg-1
esm-apps/focal

not-affected

4.6.1+dfsg-1
esm-apps/jammy

not-affected

4.6.1+dfsg-1
esm-apps/noble

not-affected

4.6.1+dfsg-1

Показывать по

EPSS

Процентиль: 61%
0.00421
Низкий

4 Medium

CVSS2

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
больше 8 лет назад

The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.

CVSS3: 4.3
debian
больше 8 лет назад

The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.p ...

CVSS3: 4.3
github
около 3 лет назад

The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.

EPSS

Процентиль: 61%
0.00421
Низкий

4 Medium

CVSS2

4.3 Medium

CVSS3