Vulnerability Details : CVE-2019-11565
Potential exploit
Server Side Request Forgery (SSRF) exists in the Print My Blog plugin before 1.6.7 for WordPress via the site parameter.
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2019-11565
- cpe:2.3:a:print_my_blog_project:print_my_blog:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11565
2.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11565
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-11565
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-11565
-
https://github.com/mnelson4/printmyblog/commit/8584a2839a541eb29fca64252e388c827af3ec21
do a little more sanitizing of the site param when REST PRoxy enabled · mnelson4/printmyblog@8584a28 · GitHubPatch;Third Party Advisory
-
https://wordpress.org/plugins/print-my-blog/#developers
Print My Blog – WordPress plugin | WordPress.orgRelease Notes;Third Party Advisory
-
https://plugins.trac.wordpress.org/changeset?old_path=%2Fprint-my-blog%2Ftrunk&old=2075667&new_path=%2Fprint-my-blog%2Ftrunk&new=2075667
Changeset 2075667 for print-my-blog/trunk – WordPress Plugin RepositoryPatch;Third Party Advisory
-
https://wpvulndb.com/vulnerabilities/9263
Print My Blog <= 1.6.5 - Unauthenticated Server Side Request Forgery (SSRF)Third Party Advisory
-
http://dumpco.re/bugs/wp-plugin-print-my-blog-ssrf
dumpco.reExploit;Issue Tracking;Third Party Advisory
Jump to