{"id":4370,"date":"2024-07-26T14:16:19","date_gmt":"2024-07-26T14:16:19","guid":{"rendered":"http:\/\/127.0.0.1\/add-admin-css-2-0-1-divulgacion-de-ruta-completa-sin-autenticacion\/"},"modified":"2024-07-26T14:16:19","modified_gmt":"2024-07-26T14:16:19","slug":"add-admin-css-2-0-1-divulgacion-de-ruta-completa-sin-autenticacion","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/add-admin-css-2-0-1-divulgacion-de-ruta-completa-sin-autenticacion\/","title":{"rendered":"Add Admin CSS <= 2.0.1 – Divulgaci\u00f3n de Ruta Completa sin Autenticaci\u00f3n"},"content":{"rendered":"
<\/p>\n
El complemento Add Admin CSS para WordPress es vulnerable a la Divulgaci\u00f3n de Ruta Completa en todas las versiones hasta, e incluyendo, la 2.0.1. Esto se debe a que el complemento utiliza bootstrap y deja archivos de prueba con display_errors activado. Esto hace posible que atacantes no autenticados recuperen la ruta completa de la aplicaci\u00f3n […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2078],"class_list":["post-4370","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6547"],"yoast_head":"\n