All the vulnerabilites related to Ari Susanto - easy-popup-show
cve-2024-29009
Vulnerability from cvelistv5
Published
2024-03-25 04:14
Modified
2024-08-27 20:21
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in easy-popup-show all versions allows a remote unauthenticated attacker to hijack the authentication of the administrator and to perform unintended operations if the administrator views a malicious page while logged in.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Ari Susanto | easy-popup-show |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:03:51.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://wordpress.org/plugins/easy-popup-show/" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN86206017/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:arisusanto:easy-popup-show:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "easy-popup-show", "vendor": "arisusanto", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-29009", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-26T19:15:29.925351Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-27T20:21:12.996Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "easy-popup-show", "vendor": "Ari Susanto", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in easy-popup-show all versions allows a remote unauthenticated attacker to hijack the authentication of the administrator and to perform unintended operations if the administrator views a malicious page while logged in." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site request forgery (CSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-25T04:14:37.123Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://wordpress.org/plugins/easy-popup-show/" }, { "url": "https://jvn.jp/en/jp/JVN86206017/" } ], "tags": [ "unsupported-when-assigned" ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-29009", "datePublished": "2024-03-25T04:14:37.123Z", "dateReserved": "2024-03-14T01:17:20.953Z", "dateUpdated": "2024-08-27T20:21:12.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
jvndb-2024-000033
Vulnerability from jvndb
Published
2024-03-25 13:31
Modified
2024-03-25 13:31
Severity ?
Summary
WordPress Plugin "easy-popup-show" vulnerable to cross-site request forgery
Details
WordPress Plugin "easy-popup-show" provided by Ari Susanto contains a cross-site request forgery vulnerability (CWE-352).
Daiki Kojima of Cryptography Laboratory, Department of Information and Communication Engineering, Tokyo Denki University reported this vulnerability to the developer and coordinated. After the coordination was completed, Daiki Kojima reported the case to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN86206017/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29009 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Ari Susanto | easy-popup-show |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000033.html", "dc:date": "2024-03-25T13:31+09:00", "dcterms:issued": "2024-03-25T13:31+09:00", "dcterms:modified": "2024-03-25T13:31+09:00", "description": "WordPress Plugin \"easy-popup-show\" provided by Ari Susanto contains a cross-site request forgery vulnerability (CWE-352).\r\n\r\nDaiki Kojima of Cryptography Laboratory, Department of Information and Communication Engineering, Tokyo Denki University reported this vulnerability to the developer and coordinated. After the coordination was completed, Daiki Kojima reported the case to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000033.html", "sec:cpe": { "#text": "cpe:/a:misc:ari_susanto_easy-popup-show", "@product": "easy-popup-show", "@vendor": "Ari Susanto", "@version": "2.2" }, "sec:cvss": [ { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2024-000033", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN86206017/index.html", "@id": "JVN#86206017", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29009", "@id": "CVE-2024-29009", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" } ], "title": "WordPress Plugin \"easy-popup-show\" vulnerable to cross-site request forgery" }