# PDF简历解析器 <=1.0 SMTP凭证泄露漏洞
## 概述
PDF Resume Parser WordPress 插件存在敏感信息泄露漏洞,影响所有版本至 1.0(含)。
## 影响版本
所有版本 ≤ 1.0
## 细节
该插件注册了一个可被未认证用户访问的 AJAX 动作处理程序,导致 SMTP 配置信息(包括用户名和密码)被暴露。
## 影响
未认证攻击者可获取 WordPress 中存储的 SMTP 凭据,进而利用这些凭据攻击电子邮件账户,或尝试访问使用相同凭据的其他系统。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: ERROR: The request could not be satisfied -- 🔗来源链接
标签:
神龙速读:
以下是从该网页截图中获取到的关于漏洞的关键信息,以简洁的Markdown格式返回:
```markdown
### 403 Error: Request Blocked
- **Reason**: Request was blocked, indicating a potential security policy in place such as Web Application Firewall (WAF) rules or security groups.
- **Details**:
- Generated by CloudFront, suggesting the block happened at the AWS CloudFront edge location.
- Request ID: `veKkkFmU88MOVHImnDC2iCmQi28VFowBYxRJuVVpv5Nen41N5VXDI20==`, useful for support inquiries or logs correlation.
- **Possible Vulnerability Insight**: The 403 Forbidden error could be due to overly restrictive access controls or an incorrect security configuration, potentially pointing to a Denial of Service (DoS) protection mechanism triggering erroneously. It does not directly suggest a traditional software vulnerability but points towards a configuration issue that might allow for bypass or DoS strategies if exploited.
- **Actionable Advice**: Review CloudFront and origin server access logs, and inspect security configurations for unintended blocks.
```
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.