Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.
References
Configurations
History
21 Nov 2024, 02:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://michaelwalsh.org/blog/2015/07/wp-swimteam-v1-45-beta-3-now-available/ - | |
References | () http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.html - Exploit | |
References | () http://www.securityfocus.com/bid/75600 - | |
References | () http://www.vapid.dhs.org/advisory.php?v=134 - Exploit | |
References | () https://wordpress.org/support/topic/security-vulnerability-6 - Patch, Vendor Advisory | |
References | () https://wpvulndb.com/vulnerabilities/8071 - Exploit |
Information
Published : 2016-01-12 19:59
Updated : 2024-11-21 02:33
NVD link : CVE-2015-5471
Mitre link : CVE-2015-5471
CVE.ORG link : CVE-2015-5471
JSON object : View
Products Affected
swim_team_project
- swim_team
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')