oss-sec mailing list archives
CVE request: WordPress plugin wp-source-control remote path traversal file access
From: Henri Salo <henri () nerv fi>
Date: Tue, 19 Aug 2014 12:42:11 +0300
Product: WordPress plugin wp-source-control Plugin page: https://wordpress.org/plugins/wp-source-control/ Developer: https://profiles.wordpress.org/mmdeveloper/ Vulnerability Type: Remote Path Traversal File Access Vulnerable Versions: All. Current is 3.0.0 Fixed Version: N/A Vulnerability Details: Wp Source Control plugin for WordPress contains a flaw that allows traversing outside of a restricted path. The issue is due to the downloadfiles/download.php script not properly sanitizing user input, specifically path traversal style attacks (e.g. '../'). With a specially crafted request, a remote attacker can gain access to arbitrary files, which can be read by web server process. Root cause: Unsanitized user input to file_get_contents() function. Proof-of-concept: /wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php Notes: Vendor contact details unknown. This vulnerability can be used to get WordPress database address, username and password, which can be used in certain environments to elevate privileges and execute malicious PHP code. --- Henri Salo
Attachment:
signature.asc
Description: Digital signature
Current thread:
- CVE request: WordPress plugin wp-source-control remote path traversal file access Henri Salo (Aug 19)