From 01052dfbf85a16b0e0e9484ed9844c6a8a143288 Mon Sep 17 00:00:00 2001 From: sampion88 Date: Fri, 24 Jan 2025 17:01:20 +0100 Subject: [PATCH] fix --- input/new.json | 149 ++++--------------------------------------------- 1 file changed, 12 insertions(+), 137 deletions(-) diff --git a/input/new.json b/input/new.json index 8f68428..87646b9 100644 --- a/input/new.json +++ b/input/new.json @@ -1,140 +1,15 @@ { - "package_name": "johnpbloch/wordpress-core", - "patch_versions": [ - "3.7.40", - "3.8.40", - "3.9.38", - "4.0.37", - "4.1.37", - "4.2.34", - "4.3.30", - "4.4.29", - "4.5.28", - "4.6.25", - "4.7.25", - "4.8.21", - "4.9.22", - "5.0.18", - "5.1.15", - "5.2.17", - "5.3.14", - "5.4.12", - "5.5.11", - "5.6.10", - "5.7.8", - "5.8.6", - "5.9.5", - "6.0.3" - ], - "vulnerable_ranges": [ - [ - "1.0.0", - "3.7.39" - ], - [ - "3.8.0", - "3.8.39" - ], - [ - "3.9.0", - "3.9.37" - ], - [ - "4.0.0", - "4.0.36" - ], - [ - "4.1.0", - "4.1.36" - ], - [ - "4.2.0", - "4.2.33" - ], - [ - "4.3.0", - "4.3.29" - ], - [ - "4.4.0", - "4.4.28" - ], - [ - "4.5.0", - "4.5.27" - ], - [ - "4.6.0", - "4.6.24" - ], - [ - "4.7.0", - "4.7.24" - ], - [ - "4.8.0", - "4.8.20" - ], - [ - "4.9.0", - "4.9.21" - ], - [ - "5.0.0", - "5.0.17" - ], - [ - "5.1.0", - "5.1.14" - ], - [ - "5.2.0", - "5.2.16" - ], - [ - "5.3.0", - "5.3.13" - ], - [ - "5.4.0", - "5.4.11" - ], - [ - "5.5.0", - "5.5.10" - ], - [ - "5.6.0", - "5.6.7" - ], - [ - "5.7.0", - "5.7.5" - ], - [ - "5.8.0", - "5.8.4" - ], - [ - "5.9.0", - "5.9.3" - ], - [ - "6.0.0", - "6.0.2" - ] - ], - "cwe": [ - "CWE-79" - ], - "tldr": "Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to inadequate escaping of the `Blog Name` field. An attacker can exploit this vulnerability by injecting a crafted payload into the `Blog Name`, which is then rendered in the application without proper sanitization. This allows the attacker to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to data theft, session hijacking, or other malicious actions.", - "doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.", - "how_to_fix": "Upgrade the `johnpbloch/wordpress-core` library to a patch version.", - "reporter": "", - "vulnerable_to": "Cross-site Scripting (XSS)", + "package_name": "", + "patch_versions": [], + "vulnerable_ranges": [], + "cwe": [], + "tldr": "", + "doest_this_affect_me": "", + "how_to_fix": "", + "vulnerable_to": "", "related_cve_id": "", - "language": "PHP", - "severity_class": "MEDIUM", - "aikido_score": 51, - "changelog": "https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-core/wordpress-core-603-authenticated-admin-stored-cross-site-scripting-via-customizer" + "language": "", + "severity_class": "", + "aikido_score": 0, + "changelog": "" }