The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
References
Link | Resource |
---|---|
https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-04-12T14:05:13
Updated: 2021-04-12T14:05:13
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24227
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-12T14:15:15.977
Modified: 2021-04-14T15:47:11.347
Link: CVE-2021-24227
JSON object: View
Redhat Information
No data.
CWE