CVSS Summary
Score | 5.5 Medium |
---|---|
Vector | Network |
Complexity | Low |
Authentication | Single |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
Last revised:
Any user able to create or edit “Sliders” (the same users who can create/edit posts, as far as I can tell) is able to delete arbitrary files that the web user has permission to write to. In addition, the attacker is told whether that operation succeeded or failed.
Depending on configuration this could lead to the attacker being able to:
Current state: Reported
Score | 5.5 Medium |
---|---|
Vector | Network |
Complexity | Low |
Authentication | Single |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
/etc/hosts
as an example because it demonstrates that you’re not limited to files within the WordPress installation, but make sure whichever file you use can be deleted by the user account WordPress is running underdocument.querySelector('[data-tnonce]').dataset['tnonce']
<form action="http://localhost/wp-admin/admin-ajax.php" method="POST"> <input type="text" name="action" value="ewic_timthumb_check"> <input type="text" name="turl" value="/etc/hosts"> <input type="text" name="security" value="NONCE"> <input type="submit"> </form>
If WordPress is being run as root (or if the web user has permission to write to that file) then the page will display “1”, if not it won’t display anything.
Disable the plugin. No fixed version is known.