Логотип exploitDog
bind:CVE-2022-2987
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-2987

Количество 2

Количество 2

nvd логотип

CVE-2022-2987

больше 3 лет назад

The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-mh2q-2wc7-4q2g

больше 3 лет назад

The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-2987

The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
github логотип
GHSA-mh2q-2wc7-4q2g

The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу