{"id":4369,"date":"2024-07-26T14:16:12","date_gmt":"2024-07-26T14:16:12","guid":{"rendered":"http:\/\/127.0.0.1\/add-admin-javascript-2-0-divulgacion-de-ruta-completa-no-autenticada\/"},"modified":"2024-07-26T14:16:12","modified_gmt":"2024-07-26T14:16:12","slug":"add-admin-javascript-2-0-divulgacion-de-ruta-completa-no-autenticada","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/add-admin-javascript-2-0-divulgacion-de-ruta-completa-no-autenticada\/","title":{"rendered":"Add Admin JavaScript <= 2.0 – Divulgaci\u00f3n de Ruta Completa no Autenticada"},"content":{"rendered":"
<\/p>\n
El plugin Add Admin JavaScript para WordPress es vulnerable a la Divulgaci\u00f3n de Ruta Completa en todas las versiones hasta, e incluyendo, la 2.0. Esto se debe a que el plugin utiliza bootstrap y deja archivos de prueba con display_errors activado. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2077],"class_list":["post-4369","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6548"],"yoast_head":"\n