.. / CVE-2021-39327

Exploit for WordPress BulletProof Security 5.1 Information Disclosure (CVE-2021-39327)

Description:

The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.

Nuclei Template

View the template here CVE-2021-39327.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-39327.yaml
Copy

References:

http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327
https://nvd.nist.gov/vuln/detail/CVE-2021-39327
https://packetstormsecurity.com/files/164420/wpbulletproofsecurity51-disclose.txt
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail=