Skip to content

Commit f9e8ac8

Browse files
committed
update more references
1 parent 1af4aae commit f9e8ac8

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

documentation/modules/auxiliary/admin/http/wp_gdpr_compliance_privesc.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Description
22

3-
This module exploits the [Wordpress GDPR compliance plugin](https://wordpress.org/plugins/wp-gdpr-compliance/) lack of validation ([WPVDB 9144](https://wpvulndb.com/vulnerabilities/9144)), which affects versions 1.4.2 and lower.
3+
This module exploits the [Wordpress GDPR compliance plugin](https://wordpress.org/plugins/wp-gdpr-compliance/) lack of validation ([WPVDB 9144](https://wpscan.com/vulnerability/9144)), which affects versions 1.4.2 and lower.
44

55
When a user triggers GDPR-related actions, Wordpress's `admin-ajax.php` is called but fails to do validation and capacity checks regarding the asked actions. This leads to any unauthenticated user being able to modify any arbitrary settings on the targeted server.
66

lib/msf/core/module/reference.rb

+1-1
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ def initialize(in_ctx_id = 'Unknown', in_ctx_val = '')
111111
elsif in_ctx_id == 'ZDI'
112112
self.site = "http://www.zerodayinitiative.com/advisories/ZDI-#{in_ctx_val}"
113113
elsif in_ctx_id == 'WPVDB'
114-
self.site = "https://wpvulndb.com/vulnerabilities/#{in_ctx_val}"
114+
self.site = "https://wpscan.com/vulnerability/#{in_ctx_val}"
115115
elsif in_ctx_id == 'PACKETSTORM'
116116
self.site = "https://packetstormsecurity.com/files/#{in_ctx_val}"
117117
elsif in_ctx_id == 'URL'

0 commit comments

Comments
 (0)