{"id":3723,"date":"2024-05-19T12:46:13","date_gmt":"2024-05-19T12:46:13","guid":{"rendered":"http:\/\/127.0.0.1\/build-app-online-1-0-21-bypass-de-autenticacion-a-traves-del-encabezado\/"},"modified":"2024-05-19T12:46:13","modified_gmt":"2024-05-19T12:46:13","slug":"build-app-online-1-0-21-bypass-de-autenticacion-a-traves-del-encabezado","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/build-app-online-1-0-21-bypass-de-autenticacion-a-traves-del-encabezado\/","title":{"rendered":"Build App Online <= 1.0.21 – Bypass de Autenticaci\u00f3n a trav\u00e9s del Encabezado"},"content":{"rendered":"
<\/p>\n
El plugin Build App Online para WordPress es vulnerable a un bypass de autenticaci\u00f3n en versiones hasta, e incluyendo, la 1.0.21. Esto se debe a la falta de comprobaci\u00f3n de autenticaci\u00f3n en la funci\u00f3n ‘set_user_cart’ con el valor de encabezado ‘user_id’. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1433],"class_list":["post-3723","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-3658"],"yoast_head":"\n