Vulnerability Name: | CVE-2017-5487 (CCN-120622) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-01-11 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-01-11 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-09-01 | ||||||||||||||||||||||||||||||||||||||||
Summary: | wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-5487 Source: CCN Type: SECTRACK ID: 1037591 WordPress Bugs Let Remote Users Conduct Cross-Site Scripting and Cross-Site Request Forgery Attacks and Obtain Potentially Sensitive Information Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20170114 Re: CVE Request: Wordpress: 8 security issues in 4.7 Source: BID Type: UNKNOWN 95391 Source: CCN Type: BID-95391 WordPress Prior to 4.7.1 Information Disclosure Vulnerability Source: SECTRACK Type: UNKNOWN 1037591 Source: CONFIRM Type: Release Notes, Vendor Advisory https://codex.wordpress.org/Version_4.7.1 Source: XF Type: UNKNOWN wp-core-cve20175487-info-disc(120622) Source: CONFIRM Type: Patch https://github.com/WordPress/WordPress/commit/daf358983cc1ce0c77bf6d2de2ebbb43df2add60 Source: CCN Type: Packet Storm Security [03-03-2017] WordPress Username Enumeration Source: CCN Type: WordPress Security Advisory WordPress 4.7.1 Security and Maintenance Release Source: CONFIRM Type: Vendor Advisory https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/ Source: MISC Type: UNKNOWN https://wpvulndb.com/vulnerabilities/8715 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [03-03-2017] Source: EXPLOIT-DB Type: UNKNOWN 41497 Source: MISC Type: Third Party Advisory https://www.wordfence.com/blog/2016/12/wordfence-blocks-username-harvesting-via-new-rest-api-wp-4-7/ | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |