6.1
CVE-2017-6815
- EPSS 6.39%
- Veröffentlicht 12.03.2017 01:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
WordPress Core < 4.7.3 - Bypass URL Validation
In WordPress before 4.7.3 (wp-includes/pluggable.php), control characters can trick redirect URL validation.
Mögliche Gegenmaßnahme
WordPress: Update to one of the following versions, or a newer patched version: 3.7.19, 3.8.19, 3.9.17, 4.0.16, 4.1.16, 4.2.13, 4.3.9, 4.4.8, 4.5.7, 4.6.4, 4.7.3
Weitere Schwachstelleninformationen
SystemWordPress Core
≫
Produkt
WordPress
Version
[*, 3.7)
Version
3.7 - 3.7.18
Version
3.8 - 3.8.18
Version
3.9 - 3.9.16
Version
4.0 - 4.0.15
Version
4.1 - 4.1.15
Version
4.2 - 4.2.12
Version
4.3 - 4.3.8
Version
4.4 - 4.4.7
Version
4.5 - 4.5.6
Version
4.6 - 4.6.3
Version
4.7 - 4.7.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Debian ≫ Debian Linux Version8.0
Debian ≫ Debian Linux Version9.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 6.39% | 0.906 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
| nvd@nist.gov | 5.8 | 8.6 | 4.9 |
AV:N/AC:M/Au:N/C:P/I:P/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.