.. / CVE-2021-39312

Exploit for WordPress True Ranker <2.2.4 - Local File Inclusion (CVE-2021-39312)

Description:

WordPress True Ranker before version 2.2.4 allows sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file via local file inclusion.

Nuclei Template

View the template here CVE-2021-39312.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-39312.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://nvd.nist.gov/vuln/detail/CVE-2021-39312
https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php
https://wpscan.com/vulnerability/d48e723c-e3d1-411e-ab8e-629fe1606c79
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312