Goby/json/WordPress-redux-framework-I...

63 lines
4.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "WordPress redux-framework Information Disclosure (CVE-2021-38314)",
"Description": "<p>WordPress is the most popular web page building system in the world.</p><p>Gutenberg template library and Redux framework plugin for WordPress <= 4.2.11 The includes in redux-core/class-redux-core.php can be used by unauthenticated users to use AJAX operations. Attackers can use MD5 values to get sensitive Information, including specific information of the plug-in list and SECURE_AUTH_KEY, etc.</p>",
"Product": "WordPress",
"Homepage": "https://wordpress.com",
"DisclosureDate": "2021-11-26",
"Author": "1291904552@qq.com",
"FofaQuery": "app=\"AUTOMATTIC-WordPress\" || app=\"WordPress\"",
"GobyQuery": "app=\"AUTOMATTIC-WordPress\" || app=\"WordPress\"",
"Level": "1",
"Impact": "<p>Gutenberg template library and Redux framework plugin for WordPress <= 4.2.11 The includes in redux-core/class-redux-core.php can be used by unauthenticated users to use AJAX operations. Attackers can use MD5 values to get sensitive Information, including specific information of the plug-in list and SECURE_AUTH_KEY, etc.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://redux.io\">https://redux.io</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "WordPress redux-framework 插件信息泄露漏洞CVE-2021-38314",
"VulType": ["信息泄露"],
"Tags": ["信息泄露"],
"Description": "<p>WordPress是全球最热门的网页搭建系统。</p><p>WordPress 的 Gutenberg 模板库和 Redux 框架插件 <= 4.2.11 在 redux-core/class-redux-core.php 中的 includes 可供未经身份验证的用户使用的 AJAX 操作攻击者可使用MD5值获取敏感信息包括插件列表具体信息和SECURE_AUTH_KEY等。</p>",
"Impact": "<p>WordPress 的 Gutenberg 模板库和 Redux 框架插件 <= 4.2.11 在 redux-core/class-redux-core.php 中的 includes 可供未经身份验证的用户使用的 AJAX 操作攻击者可使用MD5值获取敏感信息包括插件列表具体信息和SECURE_AUTH_KEY等。</p>",
"Product": "WordPress",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:<a href=\"https://redux.io\">https://redux.io</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "WordPress redux-framework Information Disclosure (CVE-2021-38314)",
"VulType": ["Information Disclosure"],
"Tags": ["Information Disclosure"],
"Description": "<p>WordPress is the most popular web page building system in the world.</p><p>Gutenberg template library and Redux framework plugin for WordPress <= 4.2.11 The includes in redux-core/class-redux-core.php can be used by unauthenticated users to use AJAX operations. Attackers can use MD5 values to get sensitive Information, including specific information of the plug-in list and SECURE_AUTH_KEY, etc.</p>",
"Impact": "<p>Gutenberg template library and Redux framework plugin for WordPress <= 4.2.11 The includes in redux-core/class-redux-core.php can be used by unauthenticated users to use AJAX operations. Attackers can use MD5 values to get sensitive Information, including specific information of the plug-in list and SECURE_AUTH_KEY, etc.</p>",
"Product": "WordPress",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://redux.io\">https://redux.io</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://fofa.so"
],
"HasExp": true,
"ExpParams": null,
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"Information Disclosure"
],
"VulType": [
"Information Disclosure"
],
"CVEIDs": [
"CVE-2021-38314"
],
"CVSSScore": "5.3",
"AttackSurfaces": {
"Application": ["WordPress"],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
""
],
"CNVD": [
""
]
}