Date: Tue, 19 Aug 2014 12:42:11 +0300 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Cc: plugins@...dpress.org Subject: CVE request: WordPress plugin wp-source-control remote path traversal file access Product: WordPress plugin wp-source-control Plugin page: https://wordpress.org/plugins/wp-source-control/ Developer: https://profiles.wordpress.org/mmdeveloper/ Vulnerability Type: Remote Path Traversal File Access Vulnerable Versions: All. Current is 3.0.0 Fixed Version: N/A Vulnerability Details: Wp Source Control plugin for WordPress contains a flaw that allows traversing outside of a restricted path. The issue is due to the downloadfiles/download.php script not properly sanitizing user input, specifically path traversal style attacks (e.g. '../'). With a specially crafted request, a remote attacker can gain access to arbitrary files, which can be read by web server process. Root cause: Unsanitized user input to file_get_contents() function. Proof-of-concept: /wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php Notes: Vendor contact details unknown. This vulnerability can be used to get WordPress database address, username and password, which can be used in certain environments to elevate privileges and execute malicious PHP code. --- Henri Salo Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.