cve/2021/CVE-2021-24312.md

18 lines
901 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24312)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Super%20Cache&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.7.3%3C%201.7.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen)
### Description
The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.
### POC
#### Reference
- https://wpscan.com/vulnerability/2142c3d3-9a7f-4e3c-8776-d469a355d62f
#### Github
No PoCs found on GitHub currently.