Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-4050

Опубликовано: 12 июн. 2020
Источник: ubuntu
Приоритет: low
CVSS2: 6
CVSS3: 3.5

Описание

In affected versions of WordPress, misuse of the set-screen-option filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

6.0+dfsg1-1ubuntu1
eoan

ignored

end of life
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

6.0+dfsg1-1ubuntu1
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needs-triage

Показывать по

6 Medium

CVSS2

3.5 Low

CVSS3

Связанные уязвимости

CVSS3: 3.5
nvd
около 5 лет назад

In affected versions of WordPress, misuse of the `set-screen-option` filter's return value allows arbitrary user meta fields to be saved. It does require an admin to install a plugin that would misuse the filter. Once installed, it can be leveraged by low privileged users. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34).

CVSS3: 3.5
debian
около 5 лет назад

In affected versions of WordPress, misuse of the `set-screen-option` f ...

CVSS3: 7.5
fstec
около 5 лет назад

Уязвимость системы управления содержимым сайта WordPress, связанная с обходом аутентификации посредством использования альтернативного пути или канала, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

6 Medium

CVSS2

3.5 Low

CVSS3