CVE-2022-1010 – Login using WordPress Users < 1.13.4 - Admin+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2022-1010
The Login using WordPress Users ( WP as SAML IDP ) WordPress plugin before 1.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup) El plugin Login using WordPress Users ( WP as SAML IDP ) de WordPress versiones anteriores a 1.13.4, no sanea ni escapa de algunos de sus ajustes, lo que podría permitir a usuarios con altos privilegios, como los administradores, llevar a cabo ataques de tipo Cross-Site Scripting cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio) The Login using WordPress Users (WP as SAML IDP) plugin by MiniOrange is vulnerable to Cross-Site Scripting in versions up to, and including, 1.13.2 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. This only affected multi-site installations and installations where unfiltered_html is disabled. • https://wpscan.com/vulnerability/e9e4dfbe-01b2-4003-80ed-db1e45f38b2b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-0229 – miniOrange's Google Authenticator < 5.5 - Unauthenticated Arbitrary Options Deletion
https://notcve.org/view.php?id=CVE-2022-0229
The miniOrange's Google Authenticator WordPress plugin before 5.5 does not have proper authorisation and CSRF checks when handling the reconfigureMethod, and does not validate the parameters passed to it properly. As a result, unauthenticated users could delete arbitrary options from the blog, making it unusable. El plugin Google Authenticator de miniOrange de WordPress versiones anteriores a 5.5, no presenta comprobaciones apropiadas de autorización y de tipo CSRF cuando maneja el reconfigureMethod, y no comprueba apropiadamente los parámetros que se le pasan. Como resultado, los usuarios no autenticados podrían eliminar opciones arbitrarias del blog, haciéndolo inusable • https://wpscan.com/vulnerability/d70c5335-4c01-448d-85fc-f8e75b104351 • CWE-352: Cross-Site Request Forgery (CSRF) CWE-862: Missing Authorization •
CVE-2021-36786
https://notcve.org/view.php?id=CVE-2021-36786
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys. La extensión miniorange_saml (también se conoce como Miniorange Saml) versiones anteriores a 1.4.3 para TYPO3, permite una exposición de datos confidenciales de credenciales y claves privadas de la API. • https://typo3.org/help/security-advisories/security https://typo3.org/security/advisory/typo3-ext-sa-2021-011 • CWE-922: Insecure Storage of Sensitive Information •
CVE-2021-36785
https://notcve.org/view.php?id=CVE-2021-36785
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. La extensión miniorange_saml (también se conoce como Miniorange Saml) versiones anteriores a 1.4.3 para TYPO3, permite un ataque de tipo XSS. • https://typo3.org/help/security-advisories/security https://typo3.org/security/advisory/typo3-ext-sa-2021-011 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-6850 – SAML Single Sign On – SAML SSO Login <= 4.8.83 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2020-6850
Utilities.php in the miniorange-saml-20-single-sign-on plugin before 4.8.84 for WordPress allows XSS via a crafted SAML XML Response to wp-login.php. This is related to the SAMLResponse and RelayState variables, and the Destination parameter of the samlp:Response XML element. El archivo Utilities.php en el plugin miniorange-saml-20-single-sign-on versiones anteriores a 4.8.84 para WordPress, permite un ataque de tipo XSS por medio de una Respuesta XML SAML diseñada en el archivo wp-login.php. Esto está relacionado con las variables SAMLResponse y RelayState y el parámetro Destination del elemento XML samlp:Response. • https://wordpress.org/plugins/miniorange-saml-20-single-sign-on/#developers https://zeroauth.ltd/blog https://zeroauth.ltd/blog/2020/01/28/cve-2020-6850-miniorange-saml-wp-plugin-before-4-8-84-is-vulnerable-to-xss-via-a-specially-crafted-saml-xml-response • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •