Goby/json/Wordpress-Zoomsounds-Arbitr...

69 lines
4.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Wordpress Zoomsounds Arbitrary File Read (CVE-2021-39316)",
"Description": "<p>WordPress is the most popular web page building system in the world.</p><p>The WordPress Zoomsounds plugin has an arbitrary file reading vulnerability. The vulnerability stems from the fact that the plugin version <= 6.45 allows the dzsap_download operation to use the directory traversal in the link parameter to download arbitrary files, including sensitive configuration files, such as wp-config.php.</p>",
"Product": "WordPress",
"Homepage": "https://wordpress.com",
"DisclosureDate": "2021-12-01",
"Author": "1291904552@qq.com",
"FofaQuery": "body=\"Zoomsounds\"",
"GobyQuery": "body=\"Zoomsounds\"",
"Level": "2",
"Impact": "<p>The WordPress Zoomsounds plugin has an arbitrary file reading vulnerability. The vulnerability stems from the fact that the plugin version <= 6.45 allows the dzsap_download operation to use the directory traversal in the link parameter to download arbitrary files, including sensitive configuration files, such as wp-config.php.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://wordpress.com\">https://wordpress.com</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "Wordpress Zoomsounds 插件任意文件读取漏洞CVE-2021-39316",
"VulType": ["文件读取"],
"Tags": ["文件读取"],
"Description": "<p>WordPress是全球最热门的网页搭建系统。</p><p>WordPress Zoomsounds 插件存在任意文件读取漏洞,该漏洞源于该插件版本<= 6.45的允许通过 dzsap_download 操作使用 link 参数中的目录遍历来下载任意文件,包括敏感的配置文件,例如 wp-config.php。</p>",
"Impact": "<p>WordPress Zoomsounds 插件存在任意文件读取漏洞,该漏洞源于该插件版本<= 6.45的允许通过 dzsap_download 操作使用 link 参数中的目录遍历来下载任意文件,包括敏感的配置文件,例如 wp-config.php。</p>",
"Product": "WordPress",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:<a href=\"https://wordpress.com\">https://wordpress.com</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "Wordpress Zoomsounds Arbitrary File Read (CVE-2021-39316)",
"VulType": ["file-read"],
"Tags": ["file-read"],
"Description": "<p>WordPress is the most popular web page building system in the world.</p><p>The WordPress Zoomsounds plugin has an arbitrary file reading vulnerability. The vulnerability stems from the fact that the plugin version <= 6.45 allows the dzsap_download operation to use the directory traversal in the link parameter to download arbitrary files, including sensitive configuration files, such as wp-config.php.</p>",
"Impact": "<p>The WordPress Zoomsounds plugin has an arbitrary file reading vulnerability. The vulnerability stems from the fact that the plugin version <= 6.45 allows the dzsap_download operation to use the directory traversal in the link parameter to download arbitrary files, including sensitive configuration files, such as wp-config.php.</p>",
"Product": "WordPress",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://wordpress.com\">https://wordpress.com</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://www.exploit-db.com/exploits/50564"
],
"HasExp": true,
"ExpParams": [
{
"name": "filepath",
"type": "input",
"value": "../../../../../../../../../../etc/passwd"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"file-read"
],
"VulType": [
"file-read"
],
"CVEIDs": [
"CVE-2021-39316"
],
"CVSSScore": "7.5",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
"CNNVD-202108-2783"
],
"CNVD": [
""
]
}