|
|||
Rule General Information |
---|
Release Date: | 2019-06-25 | |
Rule Name: | WordPress Admin API Directory Traversal Vulnerability (CVE-2016-6896) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool. | |
Impact: | An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityTrackerID:1036683 ExploitDB:40288 http://www.openwall.com/lists/oss-security/2016/08/20/1 https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://wordpress.org/ |