Vulnerabilites related to Unknown - Stream
cve-2021-24772
Vulnerability from cvelistv5
Published
2021-11-17 10:15
Modified
2024-08-03 19:42
Severity ?
EPSS score ?
Summary
The Stream WordPress plugin before 3.8.2 does not sanitise and validate the order GET parameter from the Stream Records admin dashboard before using it in a SQL statement, leading to an SQL injection issue.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d | x_refsource_MISC | |
https://plugins.trac.wordpress.org/changeset/2615811/stream | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:42:17.013Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2615811/stream" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Stream", "vendor": "Unknown", "versions": [ { "lessThan": "3.8.2", "status": "affected", "version": "3.8.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "bl4derunner" } ], "descriptions": [ { "lang": "en", "value": "The Stream WordPress plugin before 3.8.2 does not sanitise and validate the order GET parameter from the Stream Records admin dashboard before using it in a SQL statement, leading to an SQL injection issue." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-17T10:15:35", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2615811/stream" } ], "source": { "discovery": "EXTERNAL" }, "title": "Stream \u003c 3.8.2 - Admin+ SQL Injection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24772", "STATE": "PUBLIC", "TITLE": "Stream \u003c 3.8.2 - Admin+ SQL Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Stream", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "3.8.2", "version_value": "3.8.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "bl4derunner" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Stream WordPress plugin before 3.8.2 does not sanitise and validate the order GET parameter from the Stream Records admin dashboard before using it in a SQL statement, leading to an SQL injection issue." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/b9d4f2ad-2f12-4822-817d-982a016af85d" }, { "name": "https://plugins.trac.wordpress.org/changeset/2615811/stream", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2615811/stream" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24772", "datePublished": "2021-11-17T10:15:35", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:42:17.013Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4384
Vulnerability from cvelistv5
Published
2023-02-06 19:59
Modified
2024-08-03 01:41
Severity ?
EPSS score ?
Summary
The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5 | exploit, vdb-entry, technical-description |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:41:44.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "product": "Stream", "vendor": "Unknown", "versions": [ { "lessThan": "3.9.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Krzysztof Zaj\u0105c" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-06T19:59:16.563Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5" } ], "source": { "discovery": "EXTERNAL" }, "title": "Stream \u003c 3.9.2 - Subscriber+ Alert Creation", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-4384", "datePublished": "2023-02-06T19:59:16.563Z", "dateReserved": "2022-12-09T14:57:09.167Z", "dateUpdated": "2024-08-03T01:41:44.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }