Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-24220— All Thrive Themes Legacy Themes < 2.0.0 - Unauthenticated Arbitrary File Upload and Option Deletion

EPSS 63.79% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-24220

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
All Thrive Themes Legacy Themes < 2.0.0 - Unauthenticated Arbitrary File Upload and Option Deletion
Source: NVD (National Vulnerability Database)
Vulnerability Description
Thrive “Legacy” Rise by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0 register a REST API endpoint to compress images using the Kraken image optimization engine. By supplying a crafted request in combination with data inserted using the Option Update vulnerability, it was possible to use this endpoint to retrieve malicious code from a remote URL and overwrite an existing file on the site with it or create a new file.This includes executable PHP files that contain malicious code.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
危险类型文件的不加限制上传
Source: NVD (National Vulnerability Database)
Vulnerability Title
Wordpress插件 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress 插件是WordPress开源的一个应用插件。 多款Wordpress插件存在安全漏洞,该漏洞允许攻击者通过提供精心设计的请求并结合使用Option Update漏洞插入的数据,可以使用此端点从远程URL检索恶意代码并用它覆盖站点上的现有文件或创建新文件(包括可执行文件)。以下产品及版本受到影响:Thrive “Legacy” Rise by Thri
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Thrive ThemesRise by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesLuxe by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesMinus by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesIgnition by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesFocusBlog by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesSquared by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesVoice 2.0.0 ~ 2.0.0 -
Thrive ThemesPerformag by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesPressive by Thrive Themes 2.0.0 ~ 2.0.0 -
Thrive ThemesStoried by Thrive Themes 2.0.0 ~ 2.0.0 -

II. Public POCs for CVE-2021-24220

#POC DescriptionSource LinkShenlong Link
1Thrive “Legacy” Rise by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0 register a REST API endpoint to compress images using the Kraken image optimization engine. By supplying a crafted request in combination with data inserted using the Option Update vulnerability, it was possible to use this endpoint to retrieve malicious code from a remote URL and overwrite an existing file on the site with it or create a new file.This includes executable PHP files that contain malicious code. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-24220.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-24220

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-24220

No comments yet


Leave a comment