id: CVE-2021-39327 info: name: WordPress BulletProof Security 5.1 Information Disclosure author: geeknik severity: medium description: The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1. remediation: | Update to the latest version of WordPress BulletProof Security. reference: - https://packetstormsecurity.com/files/164420/wpbulletproofsecurity51-disclose.txt - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail= classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-39327 cwe-id: CWE-459,CWE-200 epss-score: 0.1118 epss-percentile: 0.94543 cpe: cpe:2.3:a:ait-pro:bulletproof_security:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: ait-pro product: bulletproof_security framework: wordpress tags: exposure,packetstorm,cve,cve2021,wordpress http: - method: GET path: - '{{BaseURL}}/wp-content/bps-backup/logs/db_backup_log.txt' - '{{BaseURL}}/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt' matchers-condition: and matchers: - type: word part: body words: - 'BPS DB BACKUP LOG' - '==================' condition: and - type: word part: header words: - 'text/plain' - type: status status: - 200 # digest: 4a0a00473045022100b6e0a47a0ddf2a09ff3cf06131f4c028652a580ab0ee52a654435e971239e1100220371a5385fbe9950df1f5ad3b6366da865813b9b18cf3a862addef33c0d2c5332:922c64590222798bb761d5b6d8e72950