低危 wordpress wordpress xml外部实体引用的不恰当限制(xxe)
CVE编号
CVE-2021-29447利用情况
POC 已公开补丁情况
官方补丁披露时间
2021-04-16漏洞描述
Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. This has been patched in WordPress version 5.7.1, along with the older affected versions via a minor release. We strongly recommend you keep auto-updates enabled.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | wordpress | wordpress | * | From (including) 5.6.0 | Up to (excluding) 5.7.1 | ||||
运行在以下环境 | |||||||||
系统 | debian_10 | wordpress | * | Up to (excluding) 5.0.12+dfsg1-0+deb10u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | wordpress | * | Up to (excluding) 5.7.1+dfsg1-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | wordpress | * | Up to (excluding) 5.7.1+dfsg1-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_9 | wordpress | * | Up to (excluding) 4.7.20+dfsg-1+deb9u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | wordpress | * | Up to (excluding) 5.7.1+dfsg1-1 | |||||
- 攻击路径 本地
- 攻击复杂度 容易
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 POC 已公开
- 补丁情况 官方补丁
- 数据保密性 N/A
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-611 | XML外部实体引用的不恰当限制(XXE) |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论