Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7169

Опубликовано: 05 янв. 2017
Источник: debian
EPSS Низкий

Описание

Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed4.6.1+dfsg-1package

Примечания

  • https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/

  • Fixed in 4.6.1 release upstream

  • Fixed by: https://core.trac.wordpress.org/changeset/38524

EPSS

Процентиль: 85%
0.02639
Низкий

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 8 лет назад

Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.

CVSS3: 6.3
nvd
больше 8 лет назад

Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.

CVSS3: 6.3
github
около 3 лет назад

Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter.

EPSS

Процентиль: 85%
0.02639
Низкий