The run_action function of the Facebook for WordPress plugin before 3.0.0 deserializes user supplied data making it possible for PHP objects to be supplied creating an Object Injection vulnerability. There was also a useable magic method in the plugin that could be used to achieve remote code execution.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/03/two-vulnerabilities-patched-in-facebook-for-wordpress-plugin/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a | Exploit Third Party Advisory |
https://www.wordfence.com/blog/2021/03/two-vulnerabilities-patched-in-facebook-for-wordpress-plugin/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/509f2754-a1a1-4142-9126-ae023a88533a - Exploit, Third Party Advisory | |
References | () https://www.wordfence.com/blog/2021/03/two-vulnerabilities-patched-in-facebook-for-wordpress-plugin/ - Exploit, Third Party Advisory |
Information
Published : 2021-04-12 14:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24217
Mitre link : CVE-2021-24217
CVE.ORG link : CVE-2021-24217
JSON object : View
Products Affected
CWE
CWE-502
Deserialization of Untrusted Data