CVE-2024-9109

The WooCommerce UPS Shipping – Live Rates and Access Points plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_oauth_data function in all versions up to, and including, 2.3.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete the plugin's API key.
Configurations

Configuration 1 (hide)

cpe:2.3:a:octolize:woocommerce_ups_shipping:*:*:*:*:free:wordpress:*:*

History

06 Nov 2024, 17:18

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/flexible-shipping-ups/trunk/vendor_prefixed/octolize/wp-ups-oauth/src/OAuth/Ajax.php#L32 - () https://plugins.trac.wordpress.org/browser/flexible-shipping-ups/trunk/vendor_prefixed/octolize/wp-ups-oauth/src/OAuth/Ajax.php#L32 - Product
References () https://plugins.trac.wordpress.org/changeset/3173845/flexible-shipping-ups/tags/3.0.0/vendor_prefixed/octolize/wp-ups-oauth/src/OAuth/Ajax.php?old=3158553&old_path=flexible-shipping-ups%2Ftags%2F2.3.11%2Fvendor_prefixed%2Foctolize%2Fwp-ups-oauth%2Fsrc%2FOAuth%2FAjax.php - () https://plugins.trac.wordpress.org/changeset/3173845/flexible-shipping-ups/tags/3.0.0/vendor_prefixed/octolize/wp-ups-oauth/src/OAuth/Ajax.php?old=3158553&old_path=flexible-shipping-ups%2Ftags%2F2.3.11%2Fvendor_prefixed%2Foctolize%2Fwp-ups-oauth%2Fsrc%2FOAuth%2FAjax.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/699fdea9-15ae-4882-9723-9a98d7d53c74?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/699fdea9-15ae-4882-9723-9a98d7d53c74?source=cve - Third Party Advisory
CPE cpe:2.3:a:octolize:woocommerce_ups_shipping:*:*:*:*:free:wordpress:*:*
First Time Octolize woocommerce Ups Shipping
Octolize

25 Oct 2024, 12:56

Type Values Removed Values Added
Summary
  • (es) El complemento WooCommerce UPS Shipping – Live Rates and Access Points para WordPress es vulnerable a la modificación no autorizada de datos debido a una falta de verificación de capacidad en la función delete_oauth_data en todas las versiones hasta la 2.3.11 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen la clave API del complemento.

25 Oct 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-25 06:15

Updated : 2024-11-06 17:18


NVD link : CVE-2024-9109

Mitre link : CVE-2024-9109

CVE.ORG link : CVE-2024-9109


JSON object : View

Products Affected

octolize

  • woocommerce_ups_shipping
CWE
CWE-862

Missing Authorization