id: CVE-2021-39327 info: name: WordPress BulletProof Security 5.1 Information Disclosure author: geeknik severity: medium description: The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1. remediation: | Update to the latest version of WordPress BulletProof Security. reference: - https://packetstormsecurity.com/files/164420/wpbulletproofsecurity51-disclose.txt - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 - https://nvd.nist.gov/vuln/detail/CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail= classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-39327 cwe-id: CWE-459,CWE-200 epss-score: 0.1118 epss-percentile: 0.94563 cpe: cpe:2.3:a:ait-pro:bulletproof_security:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: ait-pro product: bulletproof_security framework: wordpress tags: exposure,packetstorm,cve,cve2021,wordpress http: - method: GET path: - '{{BaseURL}}/wp-content/bps-backup/logs/db_backup_log.txt' - '{{BaseURL}}/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt' matchers-condition: and matchers: - type: word part: body words: - 'BPS DB BACKUP LOG' - '==================' condition: and - type: word part: header words: - 'text/plain' - type: status status: - 200 # digest: 4b0a00483046022100dfbd8eceed05cc0b5a92a4cb0729f331380dc176fbba99bf70a4de7b3d251697022100b217af3d1724040af55117fc2785892747d092003d5f2ea7e3a318ec301e9922:922c64590222798bb761d5b6d8e72950