CVSS Summary
Score | 5.5 Medium |
---|---|
Vector | Network |
Complexity | Low |
Authentication | Single |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
Last revised:
The plugin contains a file manager component which allows broad access to the filesystem including deleting files, uploading files, and moving files. In this proof-of-concept we’ll be using path traversal to copy an Apache configuration file into a web-readable directory in order to allow the attacker to read secrets.
Current state: Fixed
Score | 5.5 Medium |
---|---|
Vector | Network |
Complexity | Low |
Authentication | Single |
Confidentiality | Partial |
Integrity | Partial |
Availability | None |
Note that the number of “../”s you need to use will vary by server configuration, the file “/etc/apache2/apache2.conf” will not be available in all configurations, and some servers may be configured to block requests to .conf files in wp-content/uploads.
If the www user has write access to /etc this could break Apache. But in most cases they will not, so PHP’s rename() function will merely copy the file instead of moving it.
Upgrade to version 1.3.34 or later.