Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-8943

Опубликовано: 20 фев. 2019
Источник: debian
EPSS Критический

Описание

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressundeterminedpackage
wordpresspostponedjessiepackage

Примечания

  • https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/

  • This CVE is explicitly for the mentioned Path Traversal in wp_crop_image().

  • Patching CVE-2019-8942 makes CVE-2019-8943 (RCE) not directly exploitable

  • RCE would now require a vulnerable plugin, and a crop-resistant PHP webshell embedded in an image (preserved EXIF data, PNG IDAT reverse deflate...)

  • https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/#path-traversal-via-modified-post-meta

  • https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/#exploiting-the-path-traversal-lfi-in-theme-directory

EPSS

Процентиль: 100%
0.93928
Критический

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 6 лет назад

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

CVSS3: 6.5
nvd
больше 6 лет назад

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

CVSS3: 6.5
github
около 3 лет назад

WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring.

EPSS

Процентиль: 100%
0.93928
Критический