RULE(RULE ID:321938)

Rule General Information
Release Date: 2019-06-25
Rule Name: WordPress Admin API Directory Traversal Vulnerability (CVE-2016-6896)
Severity:
CVE ID:
Rule Protection Details
Description: Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
Impact: An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityTrackerID:1036683
ExploitDB:40288
http://www.openwall.com/lists/oss-security/2016/08/20/1
https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://wordpress.org/