2 results (0.001 seconds)

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 1

The Staff / Employee Business Directory for Active Directory plugin for WordPress is vulnerable to LDAP Passback in versions up to, and including, 1.2.3. This is due to insufficient validation when changing the LDAP server. This makes it possible for authenticated attackers, with administrative access and above, to change the LDAP server and retrieve the credentials for the original LDAP server. El complemento Staff / Employee Business Directory para Active Directory para WordPress es vulnerable a LDAP Passback en versiones hasta la 1.2.3 inclusive. Esto se debe a una validación insuficiente al cambiar el servidor LDAP. • https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 https://wordpress.org/plugins/ldap-ad-staff-employee-directory-search https://www.wordfence.com/threat-intel/vulnerabilities/id/1ea40b96-4693-4f98-8e6e-2ed8186cedd8?source=cve • CWE-306: Missing Authentication for Critical Function •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Staff / Employee Business Directory for Active Directory WordPress plugin before 1.2.3 does not sanitize and escape data returned from the LDAP server before rendering it in the page, allowing users who can control their entries in the LDAP directory to inject malicious javascript which could be used against high-privilege users such as a site admin. El complemento de WordPress Staff / Employee Business Directory para Active Directory anterior a 1.2.3 no sanitiza ni escapa los datos devueltos por el servidor LDAP antes de representarlos en la página, lo que permite a los usuarios que pueden controlar sus entradas en el directorio LDAP inyectar javascript malicioso que podría usarse contra usuarios con altos privilegios, como un administrador de sitio. The Staff / Employee Business Directory for Active Directory plugin for WordPress is vulnerable to improper LDAP value escaping in versions up to, and including, 1.2.1. This is due to insufficient escaping on the supplied $user_field_data value. This makes it possible for authenticated attackers with access to edit their LDAP entries to inject malicious JavaScript that will access when a user accesses a page containing the data. • https://wpscan.com/vulnerability/0b953413-cf41-4de7-ac1f-c6cb995fb158 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-116: Improper Encoding or Escaping of Output •