id: CVE-2021-39327 info: name: WordPress BulletProof Security 5.1 Information Disclosure author: geeknik severity: medium description: The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1. remediation: | Update to the latest version of WordPress BulletProof Security. reference: - https://packetstormsecurity.com/files/164420/wpbulletproofsecurity51-disclose.txt - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail= classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-39327 cwe-id: CWE-459,CWE-200 epss-score: 0.1118 epss-percentile: 0.94609 cpe: cpe:2.3:a:ait-pro:bulletproof_security:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: ait-pro product: bulletproof_security framework: wordpress tags: exposure,packetstorm,cve,cve2021,wordpress http: - method: GET path: - '{{BaseURL}}/wp-content/bps-backup/logs/db_backup_log.txt' - '{{BaseURL}}/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt' matchers-condition: and matchers: - type: word part: body words: - 'BPS DB BACKUP LOG' - '==================' condition: and - type: word part: header words: - 'text/plain' - type: status status: - 200 # digest: 4a0a00473045022100c37f114dab1c574fbbac81a62d00055b30c4bc3dbbfa424fe8ca0550f8b6f4970220400a0d1b23cb3f45af2f264718e49875e721c4c39e77c34750624a3d37a3b49c:922c64590222798bb761d5b6d8e72950