WP_Admin_UI in the Crony Cronjob Manager plugin before 0.4.7 for WordPress has CSRF via the name parameter in an action=manage&do=create operation, as demonstrated by inserting XSS sequences.
References
Link | Resource |
---|---|
https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html | Exploit Third Party Advisory |
https://github.com/cybersecurityworks/Disclosed/issues/9 | Exploit Technical Description Third Party Advisory |
https://wordpress.org/plugins/crony/#developers | Third Party Advisory |
https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html | Exploit Third Party Advisory |
https://github.com/cybersecurityworks/Disclosed/issues/9 | Exploit Technical Description Third Party Advisory |
https://wordpress.org/plugins/crony/#developers | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html - Exploit, Third Party Advisory | |
References | () https://github.com/cybersecurityworks/Disclosed/issues/9 - Exploit, Technical Description, Third Party Advisory | |
References | () https://wordpress.org/plugins/crony/#developers - Third Party Advisory |
Information
Published : 2017-09-18 01:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14530
Mitre link : CVE-2017-14530
CVE.ORG link : CVE-2017-14530
JSON object : View
Products Affected
crony_cronjob_manager_project
- crony_cronjob_manager
CWE
CWE-352
Cross-Site Request Forgery (CSRF)