Lucene search

K
vulnrichmentAppCheckVULNRICHMENT:CVE-2024-29833
HistoryMar 26, 2024 - 3:30 p.m.

CVE-2024-29833 WordPress Photo Gallery Plugin <= 1.8.21 Stored Cross Site Scripting in UploadHandler

2024-03-2615:30:28
AppCheck
github.com
1
wordpress
photo gallery
cve-2024-29833
stored xss
uploadhandler
cross site scripting
regular expression
authenticated user
unauthenticated users

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:10web:photo_gallery:1.0.1:*:*:*:*:wordpress:*:*"
    ],
    "vendor": "10web",
    "product": "photo_gallery",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.1",
        "versionType": "semver",
        "lessThanOrEqual": "1.8.21"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.4

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-29833