Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-38314— Gutenberg Template Library & Redux Framework <= 4.2.11 Sensitive Information Disclosure

CVSS 5.3 · Medium EPSS 84.08% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-38314

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Gutenberg Template Library & Redux Framework <= 4.2.11 Sensitive Information Disclosure
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress 插件安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress 插件是WordPress开源的一个应用插件。 WordPress Plugin 存在安全漏洞,该漏洞源于 The Gutenberg Template Library & Redux Framework 的未经身份验证的敏感信息披露。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Redux.ioGutenberg Template Library & Redux Framework 4.2.11 ~ 4.2.11 -

II. Public POCs for CVE-2021-38314

#POC DescriptionSource LinkShenlong Link
1 Unauthenticated Sensitive Information Disclosure (CVE-2021–38314).https://github.com/orangmuda/CVE-2021-38314POC Details
2Nonehttps://github.com/phrantom/cve-2021-38314POC Details
3Nonehttps://github.com/shubhayu-64/CVE-2021-38314POC Details
4cve-2021-38314 - Unauthenticated Sensitive Information Disclosurehttps://github.com/twseptian/cve-2021-38314POC Details
5Python exploit for CVE-2021-38314https://github.com/c0ff33b34n/CVE-2021-38314POC Details
6CVE-2021-38314 Python Exploithttps://github.com/akhilkoradiya/CVE-2021-38314POC Details
7Exploit in python3 to explore CVE-2021-38314 in Redux Framework a wordpress plugin https://github.com/0xGabe/CVE-2021-38314POC Details
8WordPress Redux Framework plugin through 4.2.11 is susceptible to information disclosure. The plugin registers several unique AJAX actions available to unauthenticated users in the includes function in redux-core/class-redux-core.php. These are predictable, given that they are based on an md5 hash of the site URL with a known salt value of -redux and an md5 hash of the previous hash with a known salt value of -support. An attacker can potentially employ these AJAX actions to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of the site's AUTH_KEY concatenated with the SECURE_AUTH_KEY.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-38314.yamlPOC Details
9Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/WordPress%20Redux%20Framework%20class-redux-helpers.php%20%E6%95%8F%E6%84%9F%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%BC%8F%E6%B4%9E%20CVE-2021-38314.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-38314

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-38314

No comments yet


Leave a comment