The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016 | Third Party Advisory |
https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-04-12 07:15
Updated : 2021-04-14 08:47
NVD link : CVE-2021-24227
Mitre link : CVE-2021-24227
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
patreon
- patreon_wordpress