The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html | Exploit Third Party Advisory VDB Entry | 
| https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php | Third Party Advisory | 
| https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 | Third Party Advisory | 
| http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html | Exploit Third Party Advisory VDB Entry | 
| https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php | Third Party Advisory | 
| https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:19
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php - Third Party Advisory | |
| References | () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 - Third Party Advisory | 
28 Feb 2022, 20:48
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry | 
05 Jan 2022, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
16 Dec 2021, 15:09
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 5.0 v3 : 7.5 | 
| CPE | cpe:2.3:a:trueranker:true_ranker:*:*:*:*:*:wordpress:*:* | |
| References | (MISC) https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 - Third Party Advisory | |
| References | (MISC) https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php - Third Party Advisory | 
14 Dec 2021, 16:35
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-12-14 16:15
Updated : 2024-11-21 06:19
NVD link : CVE-2021-39312
Mitre link : CVE-2021-39312
CVE.ORG link : CVE-2021-39312
JSON object : View
Products Affected
                trueranker
- true_ranker
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
