CVE-2013-1409
Vulnerability from cvelistv5
Published
2014-03-03 16:00
Modified
2024-08-06 14:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the CommentLuv plugin before 2.92.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _ajax_nonce parameter to wp-admin/admin-ajax.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:57:05.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://wordpress.org/plugins/commentluv/changelog" }, { "name": "20130206 Cross-Site Scripting (XSS) Vulnerability in CommentLuv WordPress Plugin", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.com/advisory/HTB23138" }, { "name": "89925", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/89925" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the CommentLuv plugin before 2.92.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _ajax_nonce parameter to wp-admin/admin-ajax.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-03T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://wordpress.org/plugins/commentluv/changelog" }, { "name": "20130206 Cross-Site Scripting (XSS) Vulnerability in CommentLuv WordPress Plugin", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.com/advisory/HTB23138" }, { "name": "89925", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/89925" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-1409", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the CommentLuv plugin before 2.92.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _ajax_nonce parameter to wp-admin/admin-ajax.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html" }, { "name": "http://wordpress.org/plugins/commentluv/changelog", "refsource": "MISC", "url": "http://wordpress.org/plugins/commentluv/changelog" }, { "name": "20130206 Cross-Site Scripting (XSS) Vulnerability in CommentLuv WordPress Plugin", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html" }, { "name": "https://www.htbridge.com/advisory/HTB23138", "refsource": "MISC", "url": "https://www.htbridge.com/advisory/HTB23138" }, { "name": "89925", "refsource": "OSVDB", "url": "http://osvdb.org/89925" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-1409", "datePublished": "2014-03-03T16:00:00", "dateReserved": "2013-01-19T00:00:00", "dateUpdated": "2024-08-06T14:57:05.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-1409\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-03-03T16:55:03.677\",\"lastModified\":\"2024-11-21T01:49:31.393\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the CommentLuv plugin before 2.92.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _ajax_nonce parameter to wp-admin/admin-ajax.php.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en el plugin CommentLuv anterior a 2.92.4 para WordPress permite a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del par\u00e1metro _ajax_nonce hacia wp-admin/admin-ajax.php.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:*:*:*:*:*:wordpress:*:*\",\"versionEndIncluding\":\"2.92.3\",\"matchCriteriaId\":\"36AC3DC8-B92A-40B2-BFC7-681F867D5124\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.7:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"636F95AC-AB76-40B3-800B-6E3553F4BD57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.71:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"6A160A4A-8CC5-4F9D-A933-C6874FE82E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.74:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"B26BC56F-565B-4112-919F-F0BF8527B877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.76:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"7F43AE7C-B045-46F1-B802-115D776C4F37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.80:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"AACA8D0D-4CF9-49CD-9165-BEEA27DA5DB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"55F90B7D-8E3C-4EEC-B380-74487EE55883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.1:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"62D1D899-8E19-4C9A-BB88-1C3C09967AB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.2:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"D5DD1386-A4EC-4FCB-8D71-DEE7D74BC6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.3:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"BA7D914B-D5E9-4D11-88D5-8FB0CE51FD6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.4:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"31F16D61-7302-44C0-B5CC-B0A1DDA0FB69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.5:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"72C721D4-2379-488A-A658-4BFE697B738F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.6:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"8B286A24-D3C9-456C-8C5C-0DD02144558C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.7:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"64673FB4-F816-428F-8343-323E66EC37BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.81.8:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"BBB9028D-F0C1-4CAB-9DA3-BC13955C23DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.1:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"93BBEC41-0674-4622-94FD-91A684530027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.3:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"332C7F14-B480-4E5A-95BD-71D743BE2846\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.5:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"E3B04456-63FA-4630-8A28-E0D6B8B77C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.6:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"EBED00D9-1101-404B-BD23-5977231A980A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.7:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"82D81550-4217-4513-99BA-5F6DB1840911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.8:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"CA0BD285-1310-495A-981F-5D0F37B0B4D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.8.1:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"084A7FD3-C2A2-4482-9529-0A10CBAFF80C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.8.2:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"C0D91DC7-E812-4E2A-8790-B9005B2E9D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.8.3:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"A76AFA9E-E085-405A-96A0-67B02552755F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"9B5F9979-C1B3-4987-9912-3948566BA987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.1:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"DF48AA18-FBA9-446D-8A67-3EE72EA9DF34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.2:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"7452E8FE-552C-4010-A30B-DEA153EB214B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.3:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"4422023A-5A1A-4511-8DD8-95B450457E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.4:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"26AAEE87-2A9D-49E7-B33F-DE398681404F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.5:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"AF8F5E1D-946E-42A7-83E1-36AF967000E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.6:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"13781B66-74F4-4D07-BFFE-B0D4C1F73DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.7:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"6DAA92E2-B958-4172-9C03-4E5026292D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.8:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"083CAC46-FD42-4D7A-8A4F-CEFED58989E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.9:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"D0296CA9-680C-4745-9B88-78C1587916B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.9.1:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"3FDBA268-58C2-4D9D-BD29-0253D04881A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.9.2:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"BD2851D4-28D9-439B-AF0C-F72AFF6AD01E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.90.9.9.3:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"462BDBCC-1A8D-4817-9C64-E8E159A15298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.91:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"58DA1AF1-DD5D-46D6-9172-BE68D6FA7839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.91.1:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"0BD6A38C-8C0A-4DB4-B0E1-0A99A1D0E67E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.92:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"D802EC3C-0B7E-4876-B2FE-F1EE3038DFC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.92.1:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"1C80DC69-BEC5-4A5F-A704-8B271811810C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.92.2:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"BDB73AA8-C6E0-4E2B-9B48-32C8D83B72C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.761:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"8B18A235-08E9-4813-9D11-09C825BC1B74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.762:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"C241FC71-3FD3-431D-8859-D123B56FA39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.763:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"8D65A860-5515-4EDB-961B-F84A96723533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.764:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"65EBC1DD-1B46-4B88-BE7F-351DD2C6A278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.765:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"6438E003-753C-48AC-8B58-5D2D01302AED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.766:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"B1C00768-505B-47A4-BB8B-F0618ECCFF24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.767:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"7A45A15B-657B-4F94-BA9B-5F28D9060F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.768:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"1AF05FCC-E6A5-441A-BA00-85B7DCF6F33D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.769:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"0DC1CE81-1C52-46F2-B2E7-0855530D08EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:commentluv:commentluv:2.7691:*:*:*:*:wordpress:*:*\",\"matchCriteriaId\":\"71094D1E-9F8A-4BDD-9D01-C4FB8C0C7BEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77EB0E7-7FA7-4232-97DF-7C7587D163F1\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/89925\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://wordpress.org/plugins/commentluv/changelog\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.htbridge.com/advisory/HTB23138\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://osvdb.org/89925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://wordpress.org/plugins/commentluv/changelog\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.htbridge.com/advisory/HTB23138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.