6.8

CVE-2014-9413

Exploit

IP Ban <= 1.2.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting

Multiple cross-site request forgery (CSRF) vulnerabilities in the IP Ban (simple-ip-ban) plugin 1.2.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) ip_list, (2) user_agent_list, or (3) redirect_url parameter in the simple-ip-ban page to wp-admin/options-general.php.
Mögliche Gegenmaßnahme
IP Ban: Update to version 1.2.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt IP Ban
Version *-1.2.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ip Ban ProjectIp Ban Version1.2.3 SwPlatformwordpress
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.18% 0.371
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.