Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140819094211.GB14387@kludge.henri.nerv.fi>
Date: Tue, 19 Aug 2014 12:42:11 +0300
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Cc: plugins@...dpress.org
Subject: CVE request: WordPress plugin wp-source-control remote path
 traversal file access

Product: WordPress plugin wp-source-control
Plugin page: https://wordpress.org/plugins/wp-source-control/
Developer: https://profiles.wordpress.org/mmdeveloper/

Vulnerability Type: Remote Path Traversal File Access
Vulnerable Versions: All. Current is 3.0.0
Fixed Version: N/A

Vulnerability Details:

Wp Source Control plugin for WordPress contains a flaw that allows traversing
outside of a restricted path. The issue is due to the downloadfiles/download.php
script not properly sanitizing user input, specifically path traversal style
attacks (e.g. '../'). With a specially crafted request, a remote attacker can
gain access to arbitrary files, which can be read by web server process.

Root cause:

Unsanitized user input to file_get_contents() function.

Proof-of-concept:

/wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php

Notes:

Vendor contact details unknown.

This vulnerability can be used to get WordPress database address, username and
password, which can be used in certain environments to elevate privileges and
execute malicious PHP code.

---
Henri Salo

Download attachment "signature.asc" of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.