All the vulnerabilites related to PureThemes - Findeo
cve-2021-24238
Vulnerability from cvelistv5
Published
2021-04-22 21:00
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
Realteo < 1.2.4 - Arbitrary Property Deletion via IDOR
References
Impacted products
▼ | Vendor | Product |
---|---|---|
PureThemes | Realteo | |
PureThemes | Findeo |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Realteo", "vendor": "PureThemes", "versions": [ { "lessThan": "1.2.4", "status": "affected", "version": "1.2.4", "versionType": "custom" } ] }, { "product": "Findeo", "vendor": "PureThemes", "versions": [ { "lessThan": "1.3.1", "status": "affected", "version": "1.3.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "m0ze" } ], "descriptions": [ { "lang": "en", "value": "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T21:00:51", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Realteo \u003c 1.2.4 - Arbitrary Property Deletion via IDOR", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24238", "STATE": "PUBLIC", "TITLE": "Realteo \u003c 1.2.4 - Arbitrary Property Deletion via IDOR" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Realteo", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.2.4", "version_value": "1.2.4" } ] } }, { "product_name": "Findeo", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.3.1", "version_value": "1.3.1" } ] } } ] }, "vendor_name": "PureThemes" } ] } }, "credit": [ { "lang": "eng", "value": "m0ze" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", "refsource": "MISC", "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" }, { "name": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5" }, { "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt", "refsource": "MISC", "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt" }, { "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt", "refsource": "MISC", "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24238", "datePublished": "2021-04-22T21:00:51", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24237
Vulnerability from cvelistv5
Published
2021-04-22 21:00
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
Realteo < 1.2.4 - Unauthenticated Reflected Cross-Site Scripting (XSS)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
PureThemes | Realteo | |
PureThemes | Findeo |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Findeo-WordPress-Theme-v1.3.0.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Realteo-WordPress-Plugin-v1.2.3.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Realteo", "vendor": "PureThemes", "versions": [ { "lessThan": "1.2.4", "status": "affected", "version": "1.2.4", "versionType": "custom" } ] }, { "product": "Findeo", "vendor": "PureThemes", "versions": [ { "lessThan": "1.3.1", "status": "affected", "version": "1.3.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "m0ze" } ], "descriptions": [ { "lang": "en", "value": "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T21:00:50", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Findeo-WordPress-Theme-v1.3.0.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Realteo-WordPress-Plugin-v1.2.3.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Realteo \u003c 1.2.4 - Unauthenticated Reflected Cross-Site Scripting (XSS)", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24237", "STATE": "PUBLIC", "TITLE": "Realteo \u003c 1.2.4 - Unauthenticated Reflected Cross-Site Scripting (XSS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Realteo", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.2.4", "version_value": "1.2.4" } ] } }, { "product_name": "Findeo", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.3.1", "version_value": "1.3.1" } ] } } ] }, "vendor_name": "PureThemes" } ] } }, "credit": [ { "lang": "eng", "value": "m0ze" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e" }, { "name": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", "refsource": "MISC", "url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/" }, { "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Findeo-WordPress-Theme-v1.3.0.txt", "refsource": "MISC", "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Findeo-WordPress-Theme-v1.3.0.txt" }, { "name": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt", "refsource": "MISC", "url": "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24237", "datePublished": "2021-04-22T21:00:50", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }