Update CVE-2021-24288.yaml

patch-1
Prince Chaddha 2021-08-31 11:07:38 +05:30 committed by GitHub
parent 886c06b53e
commit eb820fe1f2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 3 additions and 4 deletions

View File

@ -3,11 +3,10 @@ id: CVE-2021-24288
info: info:
name: AcyMailing < 7.5.0 - Open Redirect name: AcyMailing < 7.5.0 - Open Redirect
author: 0x_Akoko author: 0x_Akoko
description: |
When using acymailing to subscribe to a newsletter, you make a POST request with various parameters. Turning that to a GET request and adding the parameters as GET parameters, you can successfully go through with the subscription.
reference: https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97
severity: medium severity: medium
tags: wordpress,cve,cve2021,redirect description: When using acymailing to subscribe to a newsletter, you make a POST request with various parameters. Turning that to a GET request and adding the parameters as GET parameters, you can successfully go through with the subscription.
reference: https://wpscan.com/vulnerability/56628862-1687-4862-9ed4-145d8dfbca97
tags: wordpress,cve,cve2021,redirect,wp-plugin
requests: requests:
- method: GET - method: GET