From f0c5e1d4f195ed80ed6ddbdc30556d8f6e212d05 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 2 May 2024 21:40:16 +0530 Subject: [PATCH] format update --- http/cves/2015/CVE-2015-4455.yaml | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-) diff --git a/http/cves/2015/CVE-2015-4455.yaml b/http/cves/2015/CVE-2015-4455.yaml index a91002e7e8..0e318a76ac 100644 --- a/http/cves/2015/CVE-2015-4455.yaml +++ b/http/cves/2015/CVE-2015-4455.yaml @@ -1,6 +1,7 @@ id: CVE-2015-4455 + info: - name: CVE-2015-4455 + name: WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload author: MaStErChO severity: critical description: | @@ -8,9 +9,19 @@ info: reference: - https://nvd.nist.gov/vuln/detail/CVE-2015-4455 - http://packetstormsecurity.com/files/132256/WordPress-Aviary-Image-Editor-Add-On-For-Gravity-Forms-3.0-Beta-Shell-Upload.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2015-4455 + cwe-id: CWE-434 + epss-score: 0.28491 + epss-percentile: 0.96807 + cpe: cpe:2.3:a:aviary_image_editor_add-on_for_gravity_forms_project:aviary_image_editor_add-on_for_gravity_forms:*:beta:*:*:*:wordpress:*:* metadata: + vendor: aviary_image_editor_add-on_for_gravity_forms_project + product: aviary_image_editor_add-on_for_gravity_forms framework: wordpress - + tags: cve,cve2015,packetstorm,intrusive,file-upload variables: filename: '{{rand_base(7, "abc")}}' @@ -54,4 +65,4 @@ http: - 'contains(body_1, "Failed to upload file")' - 'status_code_2 == 200' - 'contains(body_2, "uploaded_filename\":\"{{filename}}.jpg")' - condition: and \ No newline at end of file + condition: and