CVE-2015-5471

Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:swim_team_project:swim_team:1.44.10777:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 02:33

Type Values Removed Values Added
References () http://michaelwalsh.org/blog/2015/07/wp-swimteam-v1-45-beta-3-now-available/ - () http://michaelwalsh.org/blog/2015/07/wp-swimteam-v1-45-beta-3-now-available/ -
References () http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.html - Exploit () http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.html - Exploit
References () http://www.securityfocus.com/bid/75600 - () http://www.securityfocus.com/bid/75600 -
References () http://www.vapid.dhs.org/advisory.php?v=134 - Exploit () http://www.vapid.dhs.org/advisory.php?v=134 - Exploit
References () https://wordpress.org/support/topic/security-vulnerability-6 - Patch, Vendor Advisory () https://wordpress.org/support/topic/security-vulnerability-6 - Patch, Vendor Advisory
References () https://wpvulndb.com/vulnerabilities/8071 - Exploit () https://wpvulndb.com/vulnerabilities/8071 - Exploit

Information

Published : 2016-01-12 19:59

Updated : 2024-11-21 02:33


NVD link : CVE-2015-5471

Mitre link : CVE-2015-5471

CVE.ORG link : CVE-2015-5471


JSON object : View

Products Affected

swim_team_project

  • swim_team
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')