9.8

CVE-2021-24384

Exploit

JoomSport – for Sports: Team & League, Football, Hockey & more <= 5.1.7 - Object Injection

The joomsport_md_load AJAX action of the JoomSport WordPress plugin before 5.1.8, registered for both unauthenticated and unauthenticated users, unserialised user input from the shattr POST parameter, leading to a PHP Object Injection issue. Even though the plugin does not have a suitable gadget chain to exploit this, other installed plugins could, which might lead to more severe issues such as RCE
Mögliche Gegenmaßnahme
JoomSport – for Sports: Team & League, Football, Hockey & more: Update to version 5.1.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt JoomSport – for Sports: Team & League, Football, Hockey & more
Version [*, 5.1.8)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
BeardevJoomsport SwPlatformwordpress Version < 5.1.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.46% 0.887
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.