MStore API plugin for WordPress 跨站请求伪造漏洞(CVE-2023-3200)
CVE编号
CVE-2023-3200利用情况
暂无补丁情况
N/A披露时间
2023-06-14漏洞描述
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_new_order_message function. This makes it possible for unauthenticated attackers to update new order message via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | inspireui | mstore_api | * | Up to (including) 3.9.6 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2023 | nodejs | * | Up to (excluding) 18.12.1-1.amzn2023.0.10 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_23 | noslate-anode-docs | * | Up to (excluding) 9.6.7-1.18.17.1.1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | nodejs | * | Up to (excluding) 18.17.1-1.0.2 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | libcurl-minimal | * | Up to (excluding) 16.20.2-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | libcurl-minimal | * | Up to (excluding) 16.20.2-1.fc38 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10HPC | curl | * | Up to (excluding) 12.22.11-5.p01.ky10h | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP1 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP2 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP3 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP1 | curl | * | Up to (excluding) 12.22.11-1.p02.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP3 | curl | * | Up to (excluding) 7.71.1-31.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10HPC | nodejs | * | Up to (excluding) 12.22.11-5.p01.ky10h | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP1 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP2 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP3 | curl | * | Up to (excluding) 7.71.1-31.ky10 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | nodejs12-docs | * | Up to (excluding) 18.17.1-150400.9.12.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.5 | nodejs18 | * | Up to (excluding) 18.17.1-150400.9.12.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 18.17.1-1.module+el8.8.0+21170+2efec6d4 | |||||
运行在以下环境 | |||||||||
系统 | oracle_9 | oraclelinux-release | * | Up to (excluding) 18.17.1-1.module+el9.2.0+21169+1d24b6cc | |||||
运行在以下环境 | |||||||||
系统 | redhat_9 | nodejs-full-i18n | * | Up to (excluding) 16.20.2-1.el9_2 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 需要
- 可用性 无
- 保密性 无
- 完整性 低
CWE-ID | 漏洞类型 |
CWE-352 | 跨站请求伪造(CSRF) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论