Update the description
parent
5e27e5d528
commit
f6e9fea5c4
|
@ -3,7 +3,11 @@ id: CVE-2021-24210
|
|||
info:
|
||||
name: PhastPress < 1.111 - Open Redirect
|
||||
author: 0x_Akoko
|
||||
description: There is an open redirect in the plugin that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page.
|
||||
description: |
|
||||
There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page
|
||||
with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year
|
||||
ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only
|
||||
go to whitelisted pages but it's possible to redirect the victim to any domain.
|
||||
reference: https://wpscan.com/vulnerability/9b3c5412-8699-49e8-b60c-20d2085857fb
|
||||
severity: low
|
||||
tags: wordpress,cve,cve2021,redirect
|
||||
|
|
Loading…
Reference in New Issue