Vulnerabilites related to wordpress_mobile_pack_project - wordpress_mobile_pack
CVE-2014-5337 (GCVE-0-2014-5337)
Vulnerability from cvelistv5
Published
2014-08-29 14:00
Modified
2024-08-06 11:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php.
References
▼ | URL | Tags |
---|---|---|
http://wordpress.org/plugins/wordpress-mobile-pack/changelog/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/69292 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/60584 | third-party-advisory, x_refsource_SECUNIA | |
https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:48.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/" }, { "name": "69292", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69292" }, { "name": "60584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60584" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-08-29T13:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/" }, { "name": "69292", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69292" }, { "name": "60584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60584" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/", "refsource": "CONFIRM", "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/" }, { "name": "69292", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69292" }, { "name": "60584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60584" }, { "name": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/", "refsource": "MISC", "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5337", "datePublished": "2014-08-29T14:00:00", "dateReserved": "2014-08-18T00:00:00", "dateUpdated": "2024-08-06T11:41:48.689Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2014-08-29 13:55
Modified
2025-04-12 10:46
Severity ?
Summary
The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wordpress_mobile_pack_project | wordpress_mobile_pack | * | |
wordpress_mobile_pack_project | wordpress_mobile_pack | 1.2.0 | |
wordpress_mobile_pack_project | wordpress_mobile_pack | 1.2.0 | |
wordpress_mobile_pack_project | wordpress_mobile_pack | 1.2.0 | |
wpmobilepack | wordpress_mobile_pack | 1.0.8223 | |
wpmobilepack | wordpress_mobile_pack | 1.1.1 | |
wpmobilepack | wordpress_mobile_pack | 1.1.2 | |
wpmobilepack | wordpress_mobile_pack | 1.1.3 | |
wpmobilepack | wordpress_mobile_pack | 1.1.9 | |
wpmobilepack | wordpress_mobile_pack | 1.1.91 | |
wpmobilepack | wordpress_mobile_pack | 1.1.92 | |
wpmobilepack | wordpress_mobile_pack | 1.2.1 | |
wpmobilepack | wordpress_mobile_pack | 1.2.3 | |
wpmobilepack | wordpress_mobile_pack | 1.2.4 | |
wpmobilepack | wordpress_mobile_pack | 1.2.5 | |
wpmobilepack | wordpress_mobile_pack | 2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F147661F-7D08-4231-8229-B4273D67C958", "versionEndIncluding": "2.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "EF6C3461-6D06-41C2-B7CB-8A15E77F1F8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b:*:*:*:wordpress:*:*", "matchCriteriaId": "FA2446E1-1FE5-4EE5-BE90-A2230F0772C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b2:*:*:*:wordpress:*:*", "matchCriteriaId": "276E1165-2B5A-48C9-B531-6B5234218037", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.0.8223:*:*:*:*:wordpress:*:*", "matchCriteriaId": "FB60A4D2-A776-42A6-8AE6-788D8D0DA8EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "5907D0D5-D160-4AE9-8DBD-0D48ECF06FCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "FE9DD3FC-F06B-4B46-A1D8-83A6447919A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4ADFFC5D-9C60-40D7-B3A7-E19B52262227", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.9:*:*:*:*:wordpress:*:*", "matchCriteriaId": "92964F06-6BD9-4C99-84B4-82DD621D3875", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.91:*:*:*:*:wordpress:*:*", "matchCriteriaId": "518DDAA6-0C6E-473F-BDC7-F7B3DC18F2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.92:*:*:*:*:wordpress:*:*", "matchCriteriaId": "FB8A85F7-388A-477E-930B-4F2C1756BF9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1651AC7B-4ECA-4F26-85FB-0B1EE4C1FDF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "75A8B3EC-E9AC-4765-9B66-ECE7987C0C26", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "AE63A1AE-BE24-49D1-B72E-2780E4111F4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "47D24AAA-CC3D-4611-91DD-A7680303EFF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:2.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "EAD0E689-0205-4C2B-AC4D-22BE96AA03CD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php." }, { "lang": "es", "value": "El plugin WordPress Mobile Pack anterior a 2.0.2 para WordPress no restringe debidamente el acceso a los puesto protegidos por contrase\u00f1a, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una acci\u00f3n exportarticles en export/content.php." } ], "id": "CVE-2014-5337", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-08-29T13:55:05.410", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/60584" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/69292" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }