Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F147661F-7D08-4231-8229-B4273D67C958", "versionEndIncluding": "2.0.1", "vulnerable": true}, {"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "EF6C3461-6D06-41C2-B7CB-8A15E77F1F8B", "vulnerable": true}, {"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b:*:*:*:wordpress:*:*", "matchCriteriaId": "FA2446E1-1FE5-4EE5-BE90-A2230F0772C2", "vulnerable": true}, {"criteria": "cpe:2.3:a:wordpress_mobile_pack_project:wordpress_mobile_pack:1.2.0:b2:*:*:*:wordpress:*:*", "matchCriteriaId": "276E1165-2B5A-48C9-B531-6B5234218037", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.0.8223:*:*:*:*:wordpress:*:*", "matchCriteriaId": "FB60A4D2-A776-42A6-8AE6-788D8D0DA8EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "5907D0D5-D160-4AE9-8DBD-0D48ECF06FCC", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.2:*:*:*:*:wordpress:*:*", "matchCriteriaId": "FE9DD3FC-F06B-4B46-A1D8-83A6447919A3", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4ADFFC5D-9C60-40D7-B3A7-E19B52262227", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.9:*:*:*:*:wordpress:*:*", "matchCriteriaId": "92964F06-6BD9-4C99-84B4-82DD621D3875", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.91:*:*:*:*:wordpress:*:*", "matchCriteriaId": "518DDAA6-0C6E-473F-BDC7-F7B3DC18F2D4", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.1.92:*:*:*:*:wordpress:*:*", "matchCriteriaId": "FB8A85F7-388A-477E-930B-4F2C1756BF9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.1:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1651AC7B-4ECA-4F26-85FB-0B1EE4C1FDF9", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.3:*:*:*:*:wordpress:*:*", "matchCriteriaId": "75A8B3EC-E9AC-4765-9B66-ECE7987C0C26", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.4:*:*:*:*:wordpress:*:*", "matchCriteriaId": "AE63A1AE-BE24-49D1-B72E-2780E4111F4D", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:1.2.5:*:*:*:*:wordpress:*:*", "matchCriteriaId": "47D24AAA-CC3D-4611-91DD-A7680303EFF8", "vulnerable": true}, {"criteria": "cpe:2.3:a:wpmobilepack:wordpress_mobile_pack:2.0:*:*:*:*:wordpress:*:*", "matchCriteriaId": "EAD0E689-0205-4C2B-AC4D-22BE96AA03CD", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The WordPress Mobile Pack plugin before 2.0.2 for WordPress does not properly restrict access to password protected posts, which allows remote attackers to obtain sensitive information via an exportarticles action to export/content.php."}, {"lang": "es", "value": "El plugin WordPress Mobile Pack anterior a 2.0.2 para WordPress no restringe debidamente el acceso a los puesto protegidos por contrase\u00f1a, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una acci\u00f3n exportarticles en export/content.php."}], "id": "CVE-2014-5337", "lastModified": "2024-11-21T02:11:51.927", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-08-29T13:55:05.410", "references": [{"source": "cve@mitre.org", "url": "http://secunia.com/advisories/60584"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/69292"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60584"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://wordpress.org/plugins/wordpress-mobile-pack/changelog/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69292"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://security.dxw.com/advisories/information-disclosure-vulnerability-in-wordpress-mobile-pack-allows-anybody-to-read-password-protected-posts/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}