8.8

CVE-2023-2996

Exploit

Jetpack < 12.1.1 - Author+ Arbitrary File Manipulation via API

Jetpack <= 12.1 - Authenticated (Author+) Arbitrary File Manipulation

The Jetpack WordPress plugin before 12.1.1 does not validate uploaded files, allowing users with author roles or above to manipulate existing files on the site, deleting arbitrary files, and in rare cases achieve Remote Code Execution via phar deserialization.
Mögliche Gegenmaßnahme
Jetpack – WP Security, Backup, Speed, & Growth: Update to one of the following versions, or a newer patched version: 10.0.1, 10.1.1, 10.2.2, 10.3.1, 10.4.1, 10.5.2, 10.6.2, 10.7.1, 10.8.1, 10.9.2, 11.0.1, 11.1.3, 11.2.1, 11.3.3, 11.4.1, 11.5.2, 11.6.1, 11.7.2, 11.8.5, 11.9.2, 12.0.1, 12.1.1, 2.0.9, 2.1.7, 2.2.10, 2.3.10, 2.4.7, 2.5.5, 2.6.6, 2.7.5, 2.8.5, 2.9.6, 3.0.6, 3.1.5, 3.2.5, 3.3.6, 3.4.6, 3.5.6, 3.6.4, 3.7.5, 3.8.5, 3.9.9, 4.0.6, 4.1.3, 4.2.4, 4.3.4, 4.4.4, 4.5.2, 4.6.2, 4.7.3, 4.8.4, 4.9.2, 5.0.2, 5.1.3, 5.2.4, 5.3.3, 5.4.3, 5.5.4, 5.6.4, 5.7.4, 5.8.3, 5.9.3, 6.0.3, 6.1.4, 6.2.4, 6.3.6, 6.4.5, 6.5.3, 6.6.4, 6.7.3, 6.8.4, 6.9.3, 7.0.4, 7.1.4, 7.2.4, 7.3.4, 7.4.4, 7.5.6, 7.6.3, 7.7.5, 7.8.3, 7.9.3, 8.0.2, 8.1.3, 8.2.5, 8.3.2, 8.4.4, 8.5.2, 8.6.3, 8.7.3, 8.8.4, 8.9.3, 9.0.4, 9.1.2, 9.2.3, 9.3.4, 9.4.3, 9.5.4, 9.6.3, 9.7.2, 9.8.2, 9.9.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AutomatticJetpack SwPlatformwordpress Version < 12.1.1
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Jetpack – WP Security, Backup, Speed, & Growth
Version 10.0
Version 10.1
Version 10.2-10.2.1
Version 10.3
Version 10.4
Version 10.5-10.5.1
Version 10.6-10.6.1
Version 10.7
Version 10.8
Version 10.9-10.9.1
Version 11.0
Version 11.1-11.1.2
Version 11.2
Version 11.3-11.3.2
Version 11.4
Version 11.5-11.5.1
Version 11.6
Version 11.7-11.7.1
Version 11.8-11.8.4
Version 11.9-11.9.1
Version 12.0
Version 12.1
Version 2.0-2.0.8
Version 2.1-2.1.6
Version 2.2-2.2.9
Version 2.3-2.3.9
Version 2.4-2.4.6
Version 2.5-2.5.4
Version 2.6-2.6.5
Version 2.7-2.7.4
Version 2.8-2.8.4
Version 2.9-2.9.5
Version 3.0-3.0.5
Version 3.1-3.1.4
Version 3.2-3.2.4
Version 3.3-3.3.5
Version 3.4-3.4.5
Version 3.5-3.5.5
Version 3.6-3.6.3
Version 3.7-3.7.4
Version 3.8-3.8.4
Version 3.9-3.9.8
Version 4.0-4.0.5
Version 4.1-4.1.2
Version 4.2-4.2.3
Version 4.3-4.3.3
Version 4.4-4.4.3
Version 4.5-4.5.1
Version 4.6-4.6.1
Version 4.7-4.7.2
Version 4.8-4.8.3
Version 4.9-4.9.1
Version 5.0-5.0.1
Version 5.1-5.1.2
Version 5.2-5.2.3
Version 5.3-5.3.2
Version 5.4-5.4.2
Version 5.5-5.5.3
Version 5.6-5.6.3
Version 5.7-5.7.3
Version 5.8-5.8.2
Version 5.9-5.9.2
Version 6.0-6.0.2
Version 6.1-6.1.3
Version 6.2-6.2.3
Version 6.3-6.3.5
Version 6.4-6.4.4
Version 6.5-6.5.2
Version 6.6-6.6.3
Version 6.7-6.7.2
Version 6.8-6.8.3
Version 6.9-6.9.2
Version 7.0-7.0.3
Version 7.1-7.1.3
Version 7.2-7.2.3
Version 7.3-7.3.3
Version 7.4-7.4.3
Version 7.5-7.5.5
Version 7.6-7.6.2
Version 7.7-7.7.4
Version 7.8-7.8.2
Version 7.9-7.9.2
Version 8.0-8.0.1
Version 8.1-8.1.2
Version 8.2-8.2.4
Version 8.3-8.3.1
Version 8.4-8.4.3
Version 8.5-8.5.1
Version 8.6-8.6.2
Version 8.7-8.7.2
Version 8.8-8.8.3
Version 8.9-8.9.2
Version 9.0-9.0.3
Version 9.1-9.1.1
Version 9.2-9.2.2
Version 9.3-9.3.3
Version 9.4-9.4.2
Version 9.5-9.5.3
Version 9.6-9.6.2
Version 9.7-9.7.1
Version 9.8-9.8.1
Version 9.9-9.9.1
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.35% 0.872
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Es wurden noch keine Informationen zu CWE veröffentlicht.