漏洞编号:XXXXX(CVE-2023-3320)
CVE编号
CVE-2023-3320利用情况
暂无补丁情况
N/A披露时间
2023-06-20漏洞描述
The WP Sticky Social plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing nonce validation in the ~/admin/views/admin.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | wp_sticky_social_project | wp_sticky_social | * | Up to (including) 1.0.1 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | kernel | * | Up to (excluding) 4.14.313-235.533.amzn2 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | kernel | * | Up to (excluding) 4.14.313-162.533.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | sysstat | * | Up to (excluding) 12.6.2-2.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | sysstat | * | Up to (excluding) 12.7.4-1.fc38 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | kernel | * | Up to (excluding) 4.19.90-52.25.v2207.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP3 | kernel | * | Up to (excluding) 4.19.90-52.25.v2207.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | kernel | * | Up to (excluding) 4.19.90-52.25.v2207.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP3 | kernel | * | Up to (excluding) 4.19.90-52.25.v2207.ky10 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 低
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-352 | 跨站请求伪造(CSRF) |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论