Absolute path traversal vulnerability in reviews.php in the WP AmASIN - The Amazon Affiliate Shop plugin 0.9.6 and earlier for WordPress allows remote attackers to read arbitrary files via a full pathname in the url parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://codevigilant.com/disclosure/wp-plugin-wp-amasin-the-amazon-affiliate-shop-local-file-inclusion - Exploit | |
References | () http://plugins.svn.wordpress.org/wp-amasin-the-amazon-affiliate-shop/trunk/readme.txt - Vendor Advisory |
Information
Published : 2014-10-21 15:55
Updated : 2024-11-21 02:10
NVD link : CVE-2014-4577
Mitre link : CVE-2014-4577
CVE.ORG link : CVE-2014-4577
JSON object : View
Products Affected
websupporter
- wp_amasin_-_the_amazon_affiliate_shop
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')