CVE-2016-6896

MEDIUM

Description

Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.

References

http://www.openwall.com/lists/oss-security/2016/08/20/1

http://www.securitytracker.com/id/1036683

https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html

https://wpvulndb.com/vulnerabilities/8606

https://www.exploit-db.com/exploits/40288/

Details

Source: MITRE

Published: 2017-01-18

Updated: 2017-09-03

Type: CWE-22

Risk Information

CVSS v2.0

Base Score: 5.5

Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P

Impact Score: 4.9

Exploitability Score: 8

Severity: MEDIUM

CVSS v3.0

Base Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H

Impact Score: 4.2

Exploitability Score: 2.8

Severity: HIGH