The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.
Solution:
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
The product does not properly "clean up" and remove temporary or supporting resources after they have been used.
Link | Tags |
---|---|
https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 | third party advisory |
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail= | third party advisory patch |
http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html | exploit vdb entry third party advisory |
https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39327 | third party advisory exploit |
https://www.exploit-db.com/exploits/50382 | exploit vdb entry third party advisory |