|
|||
Rule General Information |
---|
Release Date: | 2022-12-12 | |
Rule Name: | WordPress True Ranker Local File Inclusion Vulnerability (CVE-2021-39312) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file. | |
Impact: | When the file operation function in the application that does not filter the file path effectively, an attacker can import the path of a file which contains malicious code, causing a file inclusion vulnerability and executing malicious code. | |
Affected OS: | Windows, Linux, Others | |
Reference: | http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 |
|
Solutions |
---|
Please contact the software vendor to update the software patch. |