漏洞标题
N/A
漏洞描述信息
```sql
BEGIN;
-- Create a new table for storing user data securely
CREATE TABLE secure_user_data (
id SERIAL PRIMARY KEY,
user_id INTEGER NOT NULL,
email VARCHAR(255) NOT NULL,
created_at TIMESTAMP DEFAULT NOW(),
updated_at TIMESTAMP DEFAULT NOW() ON UPDATE NOW()
);
-- Move user data from the potentially vulnerable table to the new secure table
INSERT INTO secure_user_data (user_id, email)
SELECT user_id, email FROM user_data;
DROP TABLE user_data;
COMMIT;
```
This SQL script performs a migration that secures user data by creating a new secure table and moving the data from the potentially vulnerable `user_data` table to the new secure table. After the migration, the old `user_data` table is dropped.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
漏洞类别
授权机制缺失
漏洞标题
N/A
漏洞描述信息
The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpas_get_users() function hooked via AJAX in all versions up to, and including, 6.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve user data such as emails.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
漏洞类别
N/A
漏洞标题
WordPress Plugin Awesome Support 安全漏洞
漏洞描述信息
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress Plugin Awesome Support 6.1.7 版本及之前版本存在安全漏洞,该漏洞源于 wpas_get_users() 函数缺少功能检查,因此容易进行未经授权的访问。
CVSS信息
N/A
漏洞类别
其他