Update the description

patch-1
Noam Rathaus 2021-08-29 09:43:37 +03:00
parent 5e27e5d528
commit f6e9fea5c4
1 changed files with 5 additions and 1 deletions

View File

@ -3,7 +3,11 @@ id: CVE-2021-24210
info:
name: PhastPress < 1.111 - Open Redirect
author: 0x_Akoko
description: There is an open redirect in the plugin that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page.
description: |
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page
with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year
ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only
go to whitelisted pages but it's possible to redirect the victim to any domain.
reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb
severity: low
tags: wordpress,cve,cve2021,redirect