FKIE_CVE-2019-20211

Vulnerability from fkie_nvd - Published: 2020-01-13 18:15 - Updated: 2024-11-21 04:38
Summary
The CTHthemes CityBook before 2.3.4, TownHub before 1.0.6, and EasyBook before 1.2.2 themes for WordPress allow Persistent XSS via Listing Address, Listing Latitude, Listing Longitude, Email Address, Description, Name, Job or Position, Description, Service Name, Address, Latitude, Longitude, Phone Number, or Website.
References
cve@mitre.orghttps://cxsecurity.com/issue/WLB-2019120110Exploit, Third Party Advisory
cve@mitre.orghttps://cxsecurity.com/issue/WLB-2019120111Exploit, Third Party Advisory
cve@mitre.orghttps://cxsecurity.com/issue/WLB-2019120112Exploit, Third Party Advisory
cve@mitre.orghttps://themeforest.net/item/citybook-directory-listing-wordpress-theme/21694727Third Party Advisory
cve@mitre.orghttps://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622Third Party Advisory
cve@mitre.orghttps://themeforest.net/item/townhub-directory-listing-wordpress-theme/25019571Third Party Advisory
cve@mitre.orghttps://wpvulndb.com/vulnerabilities/10013Third Party Advisory
cve@mitre.orghttps://wpvulndb.com/vulnerabilities/10014Third Party Advisory
cve@mitre.orghttps://wpvulndb.com/vulnerabilities/10018Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cxsecurity.com/issue/WLB-2019120110Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cxsecurity.com/issue/WLB-2019120111Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cxsecurity.com/issue/WLB-2019120112Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://themeforest.net/item/citybook-directory-listing-wordpress-theme/21694727Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://themeforest.net/item/townhub-directory-listing-wordpress-theme/25019571Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://wpvulndb.com/vulnerabilities/10013Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://wpvulndb.com/vulnerabilities/10014Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://wpvulndb.com/vulnerabilities/10018Third Party Advisory
Impacted products
Vendor Product Version
cththemes citybook *
cththemes easybook *
cththemes townhub *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cththemes:citybook:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "12FE0E87-061C-4421-A871-2F3304BB943E",
              "versionEndExcluding": "2.3.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cththemes:easybook:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "6E8B911B-A6F5-4B33-B87D-2F6D2016BFFA",
              "versionEndExcluding": "1.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cththemes:townhub:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "3B0C9D33-1E63-4728-988F-F293EDC7AAAA",
              "versionEndExcluding": "1.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The CTHthemes CityBook before 2.3.4, TownHub before 1.0.6, and EasyBook before 1.2.2 themes for WordPress allow Persistent XSS via Listing Address, Listing Latitude, Listing Longitude, Email Address, Description, Name, Job or Position, Description, Service Name, Address, Latitude, Longitude, Phone Number, or Website."
    },
    {
      "lang": "es",
      "value": "Los temas CTHthemes CityBook versiones anteriores a  la versi\u00f3n 2.3.4, TownHub versiones anteriores a la versi\u00f3n  1.0.6 y EasyBook versiones anteriores a la versi\u00f3n  1.2.2 para WordPress, permiten un ataque de tipo XSS Persistente por medio de Listing Address, Listing Latitude, Listing Longitude, Email Address, Description, Name, Job or Position, Description, Service Name, Address, Latitude, Longitude, Phone Number, o Website."
    }
  ],
  "id": "CVE-2019-20211",
  "lastModified": "2024-11-21T04:38:12.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-13T18:15:14.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://cxsecurity.com/issue/WLB-2019120110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://cxsecurity.com/issue/WLB-2019120111"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://cxsecurity.com/issue/WLB-2019120112"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://themeforest.net/item/citybook-directory-listing-wordpress-theme/21694727"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://themeforest.net/item/townhub-directory-listing-wordpress-theme/25019571"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpvulndb.com/vulnerabilities/10013"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpvulndb.com/vulnerabilities/10014"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpvulndb.com/vulnerabilities/10018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://cxsecurity.com/issue/WLB-2019120110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://cxsecurity.com/issue/WLB-2019120111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://cxsecurity.com/issue/WLB-2019120112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://themeforest.net/item/citybook-directory-listing-wordpress-theme/21694727"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://themeforest.net/item/easybook-directory-listing-wordpress-theme/23206622"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://themeforest.net/item/townhub-directory-listing-wordpress-theme/25019571"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpvulndb.com/vulnerabilities/10013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpvulndb.com/vulnerabilities/10014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://wpvulndb.com/vulnerabilities/10018"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…