ID CVE-2014-4554
Type cve
Reporter cve@mitre.org
Modified 2015-08-28T16:26:00
Description
Cross-site scripting (XSS) vulnerability in templates/download.php in the SS Downloads plugin before 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the title parameter.
{"id": "CVE-2014-4554", "bulletinFamily": "NVD", "title": "CVE-2014-4554", "description": "Cross-site scripting (XSS) vulnerability in templates/download.php in the SS Downloads plugin before 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the title parameter.", "published": "2014-07-02T20:55:00", "modified": "2015-08-28T16:26:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4554", "reporter": "cve@mitre.org", "references": ["http://wordpress.org/plugins/ss-downloads/changelog", "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss", "http://www.securityfocus.com/bid/65141"], "cvelist": ["CVE-2014-4554"], "type": "cve", "lastseen": "2021-02-02T06:14:31", "edition": 6, "viewCount": 2, "enchantments": {"dependencies": {"references": [{"type": "wpvulndb", "idList": ["WPVDB-ID:8C05FF9B-952F-4EFB-B08A-E520436559B7"]}], "modified": "2021-02-02T06:14:31", "rev": 2}, "score": {"value": 4.1, "vector": "NONE", "modified": "2021-02-02T06:14:31", "rev": 2}, "vulnersScore": 4.1}, "cpe": ["cpe:/a:ss_downloads_project:ss_downloads:1.4.4.1"], "affectedSoftware": [{"cpeName": "ss_downloads_project:ss_downloads", "name": "ss downloads project ss downloads", "operator": "le", "version": "1.4.4.1"}], "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true}, "cvss3": {}, "cpe23": ["cpe:2.3:a:ss_downloads_project:ss_downloads:1.4.4.1:-:-:*:-:wordpress:*:*"], "cwe": ["CWE-79"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:ss_downloads_project:ss_downloads:1.4.4.1:-:-:*:-:wordpress:*:*", "versionEndIncluding": "1.4.4.1", "vulnerable": true}], "operator": "OR"}]}, "extraReferences": [{"name": "65141", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/65141"}, {"name": "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss", "refsource": "MISC", "tags": ["Exploit"], "url": "http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss"}, {"name": "http://wordpress.org/plugins/ss-downloads/changelog", "refsource": "CONFIRM", "tags": ["Patch"], "url": "http://wordpress.org/plugins/ss-downloads/changelog"}], "immutableFields": []}
{"wpvulndb": [{"lastseen": "2021-02-15T22:22:19", "bulletinFamily": "software", "cvelist": ["CVE-2014-4554"], "description": "The SS Downloads WordPress plugin was affected by a services/getfile.php file Parameter XSS security vulnerability.\n", "modified": "2019-11-27T23:52:26", "published": "2014-08-01T00:00:00", "id": "WPVDB-ID:8C05FF9B-952F-4EFB-B08A-E520436559B7", "href": "https://wpscan.com/vulnerability/8c05ff9b-952f-4efb-b08a-e520436559b7", "type": "wpvulndb", "title": "SS Downloads 1.4.4.1 - services/getfile.php file Parameter XSS", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}