RULE(RULE ID:337226)

Rule General Information
Release Date: 2022-12-12
Rule Name: WordPress True Ranker Local File Inclusion Vulnerability (CVE-2021-39312)
Severity:
CVE ID:
Rule Protection Details
Description: The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
Impact: When the file operation function in the application that does not filter the file path effectively, an attacker can import the path of a file which contains malicious code, causing a file inclusion vulnerability and executing malicious code.
Affected OS: Windows, Linux, Others
Reference: http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html
https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312
Solutions
Please contact the software vendor to update the software patch.