Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-29504

Опубликовано: 07 июн. 2021
Источник: nvd
CVSS3: 9.1
CVSS3: 7.4
CVSS2: 7.5
EPSS Низкий

Описание

WP-CLI is the command-line interface for WordPress. An improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself. The vulnerability stems from the fact that the default behavior of WP_CLI\Utils\http_request() when encountering a TLS handshake error is to disable certificate validation and retry the same request. The default behavior has been changed with version 2.5.0 of WP-CLI and the wp-cli/wp-cli framework (via https://github.com/wp-cli/wp-cli/pull/5523) so that the WP_CLI\Utils\http_request() method accepts an $insecure option that is false by default and consequently that a

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:wp-cli:wp-cli:*:*:*:*:*:*:*:*
Версия от 0.12.0 (включая) до 2.5.0 (исключая)

EPSS

Процентиль: 78%
0.01149
Низкий

9.1 Critical

CVSS3

7.4 High

CVSS3

7.5 High

CVSS2

Дефекты

CWE-295

Связанные уязвимости

CVSS3: 9.1
github
больше 4 лет назад

Improper Certificate Validation in WP-CLI framework

EPSS

Процентиль: 78%
0.01149
Низкий

9.1 Critical

CVSS3

7.4 High

CVSS3

7.5 High

CVSS2

Дефекты

CWE-295