Summary
This host is installed with WordPress
Content Source Control plugin and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow
attacker to read arbitrary files on the target system.
Impact Level: System/Application
Solution
Upgrade to version 3.1.0 or later,
For updates refer to https://wordpress.org/plugins/wp-source-control
Insight
Input passed via the 'path' parameter
to download.php script is not properly sanitized before being returned to the user
Affected
WordPress Content Source Control plugin
version 3.0.0 and earlier.
Detection
Send a crafted data via HTTP GET
request and check whether it is possible to read a local file
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-5368 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities