CVE-2015-4703

Absolute path traversal vulnerability in mysqldump_download.php in the WordPress Rename plugin 1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the dumpfname parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rename_project:rename:1.0:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 02:31

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/132460/WordPress-WP-Instance-Rename-1.0-File-Download.html - Exploit, Patch () http://packetstormsecurity.com/files/132460/WordPress-WP-Instance-Rename-1.0-File-Download.html - Exploit, Patch
References () http://www.openwall.com/lists/oss-security/2015/06/23/5 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2015/06/23/5 - Exploit, Patch
References () http://www.securityfocus.com/bid/75394 - () http://www.securityfocus.com/bid/75394 -
References () http://www.vapid.dhs.org/advisory.php?v=127 - Exploit () http://www.vapid.dhs.org/advisory.php?v=127 - Exploit
References () https://wpvulndb.com/vulnerabilities/8055 - Exploit () https://wpvulndb.com/vulnerabilities/8055 - Exploit

Information

Published : 2016-01-12 19:59

Updated : 2024-11-21 02:31


NVD link : CVE-2015-4703

Mitre link : CVE-2015-4703

CVE.ORG link : CVE-2015-4703


JSON object : View

Products Affected

rename_project

  • rename
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')