.. / CVE-2021-24226

Exploit for AccessAlly <3.5.7 - Sensitive Information Leakage (CVE-2021-24226)

Description:

WordPress AccessAlly plugin before 3.5.7 allows sensitive information leakage because the file "resource/frontend/product/product-shortcode.php" (which is responsible for the [accessally_order_form] shortcode) dumps serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, and no login or administrator role is required.

Nuclei Template

View the template here CVE-2021-24226.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-24226.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2021-24226
https://wpscan.com/vulnerability/8e3e89fd-e380-4108-be23-00e87fbaad16