Summary
This host is installed with Wordpress Advanced Dewplayer Plugin and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow remote attackers to read arbitrary files on the target system.
Impact Level: Application
Solution
Upgrade to WordPress Advanced Dewplayer 1.3 or later, For updates refer to http://wordpress.org/plugins/advanced-dewplayer
Insight
Flaw is due to the 'download-file.php' script not properly sanitizing user input, specifically path traversal style attacks (e.g. '../') supplied via the 'dew_file' parameter.
Affected
WordPress Advanced Dewplayer 1.2, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read local file or not.
References
Severity
Classification
-
CVE CVE-2013-7240 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache ActiveMQ Source Code Information Disclosure Vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability
- Apache Struts Showcase Multiple Persistence Cross-Site Scripting Vulnerabilities
- An Image Gallery Multiple Cross-Site Scripting Vulnerability
- Apache Archiva Cross Site Request Forgery Vulnerability