CVE-2021-39312

The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trueranker:true_ranker:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry
References () https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php - Third Party Advisory () https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php - Third Party Advisory
References () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 - Third Party Advisory

Information

Published : 2021-12-14 16:15

Updated : 2024-11-21 06:19


NVD link : CVE-2021-39312

Mitre link : CVE-2021-39312

CVE.ORG link : CVE-2021-39312


JSON object : View

Products Affected

trueranker

  • true_ranker
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')