2021-12-13 20:52:26 +00:00
id : CVE-2021-24997
info :
2022-05-13 20:26:43 +00:00
name : Wordpress Guppy <=1.1 - User ID Disclosure
2021-12-13 20:52:26 +00:00
author : Evan Rubinstein
2022-07-01 22:34:44 +00:00
severity : medium
2022-05-13 20:26:43 +00:00
description : Instances of the Guppy Wordpress extension up to 1.1 are vulnerable to an API disclosure vulnerability which allows remote unauthenticated attackrs to obtain all user IDs, and then use that information to make API requests to either get messages sent between users, or send messages posing as one user to another.
2021-12-13 20:52:26 +00:00
reference :
- https://www.exploit-db.com/exploits/50540
- https://patchstack.com/database/vulnerability/wp-guppy/wordpress-wp-guppy-plugin-1-2-sensitive-information-disclosure-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2021-24997
2022-07-01 22:46:47 +00:00
- https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900
2021-12-13 20:52:26 +00:00
classification :
2022-07-01 22:46:47 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
cvss-score : 6.5
2021-12-13 20:52:26 +00:00
cve-id : CVE-2021-24997
2022-07-01 22:46:47 +00:00
cwe-id : CWE-862
2022-08-27 04:41:18 +00:00
tags : wordpress,guppy,api,cve2021,cve,wp-plugin,edb,wpscan
2021-12-13 20:52:26 +00:00
requests :
- method :
path :
- "{{BaseURL}}/wp-json/guppy/v2/load-guppy-users?userId=1&offset=0&search="
matchers-condition : and
matchers :
- type : status
status :
- 200
- type : word
part : body
words :
- '"guppyUsers":'
- '"userId":'
- '"type":'
2022-05-13 20:26:43 +00:00
condition : and