Vulnerability CVE-2014-8801


Published: 2014-11-28

Description:
Directory traversal vulnerability in services/getfile.php in the Paid Memberships Pro plugin before 1.7.15 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the QUERY_STRING in a getfile action to wp-admin/admin-ajax.php.

See advisories in our WLB2 database:
Topic
Author
Date
High
Paid Memberships Pro 1.7.14.2 Path Traversal
Kacper Szurek
21.11.2014

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Paidmembershipspro -> Paid memberships pro 

 References:
http://packetstormsecurity.com/files/129189/Paid-Memberships-Pro-1.7.14.2-Path-Traversal.html
http://security.szurek.pl/paid-memberships-pro-17142-path-traversal.html
http://www.exploit-db.com/exploits/35303
http://www.paidmembershipspro.com/2014/11/critical-security-update-pmpro-v1-7-15/
http://www.securityfocus.com/bid/71293
https://exchange.xforce.ibmcloud.com/vulnerabilities/98805
https://wordpress.org/plugins/paid-memberships-pro/changelog/

Copyright 2024, cxsecurity.com

 

Back to Top