cve/2021/CVE-2021-24981.md

19 lines
955 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24981)
![](https://img.shields.io/static/v1?label=Product&message=Directorist%20%E2%80%93%20Business%20Directory%20Plugin&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=7.0.6.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
The Directorist WordPress plugin before 7.0.6.2 was vulnerable to Cross-Site Request Forgery to Remote File Upload leading to arbitrary PHP shell uploads in the wp-content/plugins directory.
### POC
#### Reference
- https://wpscan.com/vulnerability/4c45df6d-b3f6-49e5-8b1f-edd32a12d71c
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2024-05-25 21:48:12 +02:00