2021-12-13 20:52:26 +00:00
id : CVE-2021-24997
info :
2023-02-01 17:25:28 +00:00
name : WordPress Guppy <=1.1 - Information Disclosure
2021-12-13 20:52:26 +00:00
author : Evan Rubinstein
2022-07-01 22:34:44 +00:00
severity : medium
2023-02-01 17:25:28 +00:00
description : WordPress Guppy plugin through 1.1 is susceptible to an API disclosure vulnerability. This can allow an attacker to obtain all user IDs and then use them to make API requests to get messages sent between users and/or send messages posing as one user to another.
2021-12-13 20:52:26 +00:00
reference :
- https://www.exploit-db.com/exploits/50540
- https://patchstack.com/database/vulnerability/wp-guppy/wordpress-wp-guppy-plugin-1-2-sensitive-information-disclosure-vulnerability
2022-07-01 22:46:47 +00:00
- https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900
2023-02-01 17:25:28 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-24997
2021-12-13 20:52:26 +00:00
classification :
2022-07-01 22:46:47 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score : 6.5
2021-12-13 20:52:26 +00:00
cve-id : CVE-2021-24997
2022-07-01 22:46:47 +00:00
cwe-id : CWE-862
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:wp-guppy:wp_guppy:*:*:*:*:*:*:*:*
epss-score : 0.00178
2022-08-27 04:41:18 +00:00
tags : wordpress,guppy,api,cve2021,cve,wp-plugin,edb,wpscan
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2021-12-13 20:52:26 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-11-08 20:26:22 +00:00
- method : GET
2021-12-13 20:52:26 +00:00
path :
- "{{BaseURL}}/wp-json/guppy/v2/load-guppy-users?userId=1&offset=0&search="
matchers-condition : and
matchers :
- type : status
status :
- 200
- type : word
part : body
words :
- '"guppyUsers":'
- '"userId":'
- '"type":'
2022-05-13 20:26:43 +00:00
condition : and
2023-02-01 17:25:28 +00:00
# Enhanced by md on 2023/02/01