{"id":4581,"date":"2024-08-26T16:25:35","date_gmt":"2024-08-26T16:25:35","guid":{"rendered":"http:\/\/127.0.0.1\/ilc-thickbox-1-0-cross-site-request-forgery-para-actualizar-configuraciones\/"},"modified":"2024-08-26T16:25:35","modified_gmt":"2024-08-26T16:25:35","slug":"ilc-thickbox-1-0-cross-site-request-forgery-para-actualizar-configuraciones","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/ilc-thickbox-1-0-cross-site-request-forgery-para-actualizar-configuraciones\/","title":{"rendered":"ILC Thickbox <= 1.0 – Cross-Site Request Forgery para Actualizar Configuraciones"},"content":{"rendered":"
<\/p>\n
El plugin ILC Thickbox para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta, e incluyendo, la 1.0. Esto se debe a la falta o incorrecta validaci\u00f3n del nonce en una funci\u00f3n. Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del plugin a trav\u00e9s de una solicitud falsificada siempre y […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2270],"class_list":["post-4581","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-7820"],"yoast_head":"\n