CVE-2017-14530

WP_Admin_UI in the Crony Cronjob Manager plugin before 0.4.7 for WordPress has CSRF via the name parameter in an action=manage&do=create operation, as demonstrated by inserting XSS sequences.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:crony_cronjob_manager_project:crony_cronjob_manager:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
References () https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html - Exploit, Third Party Advisory () https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html - Exploit, Third Party Advisory
References () https://github.com/cybersecurityworks/Disclosed/issues/9 - Exploit, Technical Description, Third Party Advisory () https://github.com/cybersecurityworks/Disclosed/issues/9 - Exploit, Technical Description, Third Party Advisory
References () https://wordpress.org/plugins/crony/#developers - Third Party Advisory () https://wordpress.org/plugins/crony/#developers - Third Party Advisory

Information

Published : 2017-09-18 01:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14530

Mitre link : CVE-2017-14530

CVE.ORG link : CVE-2017-14530


JSON object : View

Products Affected

crony_cronjob_manager_project

  • crony_cronjob_manager
CWE
CWE-352

Cross-Site Request Forgery (CSRF)