CVE-2021-31567
WordPress Download Monitor plugin <= 4.4.6 - Authenticated Arbitrary File Download vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Authenticated (admin+) Arbitrary File Download vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6). The plugin allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the &downloadable_file_urls[0] parameter data. It's also possible to escape from the web server home directory and download any file within the OS.
Se ha detectado una vulnerabilidad de Descarga de Archivos Arbitrarios Autenticada (admin+) en el plugin Download Monitor de WordPress (versiones anteriores a 4.4.6 incluyéndola). El plugin permite descargar archivos arbitrarios, incluyendo archivos de configuración confidenciales como wp-config.php, por medio de los datos del parámetro &downloadable_file_urls[0]. También es posible escapar del directorio principal del servidor web y descargar cualquier archivo dentro del Sistema Operativo
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-10-29 CVE Published
- 2022-01-13 CVE Reserved
- 2023-12-15 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-552: Files or Directories Accessible to External Parties
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wpchill Search vendor "Wpchill" | Download Monitor Search vendor "Wpchill" for product "Download Monitor" | <= 4.4.6 Search vendor "Wpchill" for product "Download Monitor" and version " <= 4.4.6" | wordpress |
Affected
|