oss-sec mailing list archives

CVE request: WordPress plugin wp-source-control remote path traversal file access


From: Henri Salo <henri () nerv fi>
Date: Tue, 19 Aug 2014 12:42:11 +0300

Product: WordPress plugin wp-source-control
Plugin page: https://wordpress.org/plugins/wp-source-control/
Developer: https://profiles.wordpress.org/mmdeveloper/

Vulnerability Type: Remote Path Traversal File Access
Vulnerable Versions: All. Current is 3.0.0
Fixed Version: N/A

Vulnerability Details:

Wp Source Control plugin for WordPress contains a flaw that allows traversing
outside of a restricted path. The issue is due to the downloadfiles/download.php
script not properly sanitizing user input, specifically path traversal style
attacks (e.g. '../'). With a specially crafted request, a remote attacker can
gain access to arbitrary files, which can be read by web server process.

Root cause:

Unsanitized user input to file_get_contents() function.

Proof-of-concept:

/wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php

Notes:

Vendor contact details unknown.

This vulnerability can be used to get WordPress database address, username and
password, which can be used in certain environments to elevate privileges and
execute malicious PHP code.

---
Henri Salo

Attachment: signature.asc
Description: Digital signature


Current thread: