Enhancement: cves/2021/CVE-2021-24226.yaml by mp
parent
5e1368f0f5
commit
a459e577c3
|
@ -1,11 +1,10 @@
|
||||||
id: CVE-2021-24226
|
id: CVE-2021-24226
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: AccessAlly < 3.5.7 - $_SERVER Superglobal Leakage
|
name: AccessAlly <3.5.7 - Sensitive Information Leakage
|
||||||
author: dhiyaneshDK
|
author: dhiyaneshDK
|
||||||
severity: high
|
severity: high
|
||||||
description: In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which
|
description: WordPress AccessAlly plugin before 3.5.7 allows sensitive information leakage because the file \"resource/frontend/product/product-shortcode.php\" (which is responsible for the [accessally_order_form] shortcode) dumps serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, and no login or administrator role is required.
|
||||||
contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required.
|
|
||||||
reference:
|
reference:
|
||||||
- https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16
|
- https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24226
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-24226
|
||||||
|
@ -32,3 +31,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/06/22
|
||||||
|
|
Loading…
Reference in New Issue