{"containers":{"cna":{"affected":[{"product":"Error Log Viewer by BestWebSoft","vendor":"Unknown","versions":[{"lessThanOrEqual":"1.1.1","status":"affected","version":"1.1.1","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Ceylan Bozogullarindan"}],"descriptions":[{"lang":"en","value":"The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-73","description":"CWE-73 External Control of File Name or Path","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-03-14T14:41:06.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0"}],"source":{"discovery":"EXTERNAL"},"title":"Error Log Viewer Plugin <= 1.1.1 - Admin+ Arbitrary File Clearing","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24966","STATE":"PUBLIC","TITLE":"Error Log Viewer Plugin <= 1.1.1 - Admin+ Arbitrary File Clearing"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Error Log Viewer by BestWebSoft","version":{"version_data":[{"version_affected":"<=","version_name":"1.1.1","version_value":"1.1.1"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Ceylan Bozogullarindan"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Error Log Viewer WordPress plugin through 1.1.1 does not validate the path of the log file to clear, allowing high privilege users to clear arbitrary files on the web server, including those outside of the blog folder"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-73 External Control of File Name or Path"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0","refsource":"MISC","url":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:49:14.380Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/166a4f88-4f0c-4bf4-b624-5e6a02e21fa0"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24966","datePublished":"2022-03-14T14:41:06.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:49:14.380Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}