The Telefication WordPress plugin is vulnerable to Open Proxy and Server-Side Request Forgery via the ~/bypass.php file due to a user-supplied URL request value that gets called by a curl requests. This affects versions up to, and including, 1.8.0.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/telefication/tags/1.8.0/bypass.php | Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39339 | Third Party Advisory |
https://plugins.trac.wordpress.org/browser/telefication/tags/1.8.0/bypass.php | Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39339 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.8 |
References | () https://plugins.trac.wordpress.org/browser/telefication/tags/1.8.0/bypass.php - Third Party Advisory | |
References | () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39339 - Third Party Advisory |
Information
Published : 2021-09-22 11:15
Updated : 2024-11-21 06:19
NVD link : CVE-2021-39339
Mitre link : CVE-2021-39339
CVE.ORG link : CVE-2021-39339
JSON object : View
Products Affected
telefication
- telefication
CWE
CWE-918
Server-Side Request Forgery (SSRF)