Vulnerability Name: | CVE-2016-6897 (CCN-116335) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-08-20 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2016-08-20 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-09-03 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-352 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-6897 Source: CCN Type: SECTRACK ID: 1036683 WordPress Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Remote Authenticated Users Deny Service Source: MLIST Type: UNKNOWN [oss-security] 20160820 Path traversal vulnerability in WordPress Core Ajax handlers Source: BID Type: UNKNOWN 92572 Source: CCN Type: BID-92572 WordPress CVE-2016-6897 Cross Site Request Forgery Vulnerability Source: SECTRACK Type: UNKNOWN 1036683 Source: XF Type: UNKNOWN wordpress-core-ajax-cve20166897-csrf(116335) Source: CONFIRM Type: UNKNOWN https://github.com/WordPress/WordPress/commit/8c82515ab62b88fb32d01c9778f0204b296f3568 Source: CCN Type: Summer of Pwnage Web site Path traversal vulnerability in WordPress Core Ajax handlers Source: MISC Type: UNKNOWN https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html Source: CCN Type: WordPress Web site Blog Tool, Publishing Platform, and CMS WordPress Source: MISC Type: UNKNOWN https://wpvulndb.com/vulnerabilities/8606 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [08-22-2016] Source: EXPLOIT-DB Type: UNKNOWN 40288 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |