Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 19 Aug 2014 12:42:11 +0300
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: plugins@...dpress.org
Subject: CVE request: WordPress plugin wp-source-control remote path
 traversal file access

Product: WordPress plugin wp-source-control
Plugin page: https://wordpress.org/plugins/wp-source-control/
Developer: https://profiles.wordpress.org/mmdeveloper/

Vulnerability Type: Remote Path Traversal File Access
Vulnerable Versions: All. Current is 3.0.0
Fixed Version: N/A

Vulnerability Details:

Wp Source Control plugin for WordPress contains a flaw that allows traversing
outside of a restricted path. The issue is due to the downloadfiles/download.php
script not properly sanitizing user input, specifically path traversal style
attacks (e.g. '../'). With a specially crafted request, a remote attacker can
gain access to arbitrary files, which can be read by web server process.

Root cause:

Unsanitized user input to file_get_contents() function.

Proof-of-concept:

/wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php

Notes:

Vendor contact details unknown.

This vulnerability can be used to get WordPress database address, username and
password, which can be used in certain environments to elevate privileges and
execute malicious PHP code.

---
Henri Salo

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ