ଜମା କରନ୍ତୁ #52038: HTTP Header Injection in simple-history wordpress pluginସୂଚନା

ଶୀର୍ଷକHTTP Header Injection in simple-history wordpress plugin
ବର୍ଣ୍ଣନାhttp header injection vulnerability that could be manipulate http real ip with x-forwarded-for header 1. install simple-history wordpress plugin https://wordpress.org/plugins/simple-history/ 2. send login request with x-forwarded-for: [REDACTED_IP] 3.in simple-history settings and navigate to export then click on json export 4. open json file and check spoof ip in result POC: https://drive.google.com/file/d/142cPciqIhNbfKhhxIwbrYFTegLvnwin_/view?usp=sharing https://drive.google.com/file/d/1_elZPggtib_WROr2Tt1ZgyMTzoo2n_Ua/view?usp=sharing https://drive.google.com/file/d/1AJXip8UG_ADbxtokPzAb61-lEg-xLebZ/view?usp=sharing
ଉପଭୋକ୍ତା
 rezaduty (UID 10530)
ଦାଖଲ11/13/2022 07:38 PM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର11/16/2022 08:42 AM (3 days later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି213785 [Simple History Plugin ଅନ୍ WordPress Header X-Forwarded-For ବିସ୍ତାରିତ ଅଧିକାର]
ପଏଣ୍ଟ17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!