Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-5487

Опубликовано: 15 янв. 2017
Источник: ubuntu
Приоритет: low
EPSS Критический
CVSS2: 5
CVSS3: 5.3

Описание

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.

РелизСтатусПримечание
artful

not-affected

4.7.1+dfsg-1
bionic

not-affected

4.7.1+dfsg-1
cosmic

not-affected

4.7.1+dfsg-1
devel

not-affected

4.7.1+dfsg-1
esm-apps/bionic

not-affected

4.7.1+dfsg-1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [code not present]]
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
trusty

not-affected

code not present

Показывать по

EPSS

Процентиль: 100%
0.92436
Критический

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
больше 8 лет назад

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.

CVSS3: 5.3
debian
больше 8 лет назад

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in t ...

CVSS3: 5.3
github
около 3 лет назад

wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.

EPSS

Процентиль: 100%
0.92436
Критический

5 Medium

CVSS2

5.3 Medium

CVSS3