{"containers":{"cna":{"affected":[{"product":"Patreon WordPress","vendor":"Unknown","versions":[{"lessThan":"1.7.0","status":"affected","version":"1.7.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas"}],"descriptions":[{"lang":"en","value":"The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Information Exposure","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-04-12T14:05:13.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016"},{"tags":["x_refsource_MISC"],"url":"https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/"}],"source":{"discovery":"UNKNOWN"},"title":"Patreon WordPress < 1.7.0 - Unauthenticated Local File Disclosure","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24227","STATE":"PUBLIC","TITLE":"Patreon WordPress < 1.7.0 - Unauthenticated Local File Disclosure"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Patreon WordPress","version":{"version_data":[{"version_affected":"<","version_name":"1.7.0","version_value":"1.7.0"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"George Stephanis, Fioravante Souza, Miguel Neto, Benedict Singer and Marc Montpas"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Jetpack Scan team identified a Local File Disclosure vulnerability in the Patreon WordPress plugin before 1.7.0 that could be abused by anyone visiting the site. Using this attack vector, an attacker could leak important internal files like wp-config.php, which contains database credentials and cryptographic keys used in the generation of nonces and cookies."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200 Information Exposure"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016","refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016"},{"name":"https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/","refsource":"MISC","url":"https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:21:18.863Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wpscan.com/vulnerability/f62df02d-7678-440f-84a1-ddbf09364016"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://jetpack.com/2021/03/26/vulnerabilities-found-in-patreon-wordpress-plugin/"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24227","datePublished":"2021-04-12T14:05:13.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:21:18.863Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}