Summary
This host is installed with Wordpress Advanced Dewplayer Plugin and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow remote attackers to read arbitrary files on the target system.
Impact Level: Application
Solution
Upgrade to WordPress Advanced Dewplayer 1.3 or later, For updates refer to http://wordpress.org/plugins/advanced-dewplayer
Insight
Flaw is due to the 'download-file.php' script not properly sanitizing user input, specifically path traversal style attacks (e.g. '../') supplied via the 'dew_file' parameter.
Affected
WordPress Advanced Dewplayer 1.2, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read local file or not.
References
Severity
Classification
-
CVE CVE-2013-7240 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability
- Admidio get_file.php Remote File Disclosure Vulnerability
- Apache Tomcat Cross-Site Scripting and Security Bypass Vulnerabilities