Vulnerability CVE-2021-24549


Published: 2021-08-23

Description:
The AceIDE WordPress plugin through 2.6.2 does not sanitise or validate the user input which is appended to system paths before using it in various actions, such as to read arbitrary files from the server. This allows high privilege users such as administrator to access any file on the web server outside of the blog directory via a path traversal attack.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Aceide project -> Aceide 

 References:
https://wpscan.com/vulnerability/c594abaf-b152-448c-8a20-9b3267fe547a
https://codevigilant.com/disclosure/2021/wp-plugin-aceide/

Copyright 2022, cxsecurity.com

 

Back to Top