From 47eea9386927854f0506b029662dac4501935832 Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action Date: Tue, 31 Dec 2024 06:08:31 +0000 Subject: [PATCH] 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2024-11972 - 0 updated CVEs: --- cves/2024/11xxx/CVE-2024-11972.json | 83 +++++++++++++++++++++++++++++ cves/delta.json | 14 ++--- cves/deltaLog.json | 14 +++++ 3 files changed, 104 insertions(+), 7 deletions(-) create mode 100644 cves/2024/11xxx/CVE-2024-11972.json diff --git a/cves/2024/11xxx/CVE-2024-11972.json b/cves/2024/11xxx/CVE-2024-11972.json new file mode 100644 index 000000000000..3870f9fa3016 --- /dev/null +++ b/cves/2024/11xxx/CVE-2024-11972.json @@ -0,0 +1,83 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-11972", + "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", + "state": "PUBLISHED", + "assignerShortName": "WPScan", + "dateReserved": "2024-11-28T19:29:06.929Z", + "datePublished": "2024-12-31T06:00:01.751Z", + "dateUpdated": "2024-12-31T06:00:01.751Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", + "shortName": "WPScan", + "dateUpdated": "2024-12-31T06:00:01.751Z" + }, + "title": "Hunk Companion < 1.9.0 - Unauthenticated Plugin Installation", + "problemTypes": [ + { + "descriptions": [ + { + "description": "CWE-862 Missing Authorization", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "affected": [ + { + "vendor": "Unknown", + "product": "Hunk Companion", + "versions": [ + { + "status": "affected", + "versionType": "semver", + "version": "0", + "lessThan": "1.9.0" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed." + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/4963560b-e4ae-451d-8f94-482779c415e4/", + "tags": [ + "exploit", + "vdb-entry", + "technical-description" + ] + } + ], + "credits": [ + { + "lang": "en", + "value": "Daniel Rodriguez", + "type": "finder" + }, + { + "lang": "en", + "value": "WPScan", + "type": "coordinator" + } + ], + "source": { + "discovery": "EXTERNAL" + }, + "x_generator": { + "engine": "WPScan CVE Generator" + } + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index cd90254ef879..78d03ab06214 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,14 +1,14 @@ { - "fetchTime": "2024-12-31T04:58:05.477Z", + "fetchTime": "2024-12-31T06:08:20.860Z", "numberOfChanges": 1, - "new": [], - "updated": [ + "new": [ { - "cveId": "CVE-2024-12856", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12856", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12856.json", - "dateUpdated": "2024-12-31T04:56:14.218Z" + "cveId": "CVE-2024-11972", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11972", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11972.json", + "dateUpdated": "2024-12-31T06:00:01.751Z" } ], + "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 462d66ab7d9c..1c14ae852f89 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,18 @@ [ + { + "fetchTime": "2024-12-31T06:08:20.860Z", + "numberOfChanges": 1, + "new": [ + { + "cveId": "CVE-2024-11972", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11972", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11972.json", + "dateUpdated": "2024-12-31T06:00:01.751Z" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2024-12-31T04:58:05.477Z", "numberOfChanges": 1,