The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/08/20/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/96847 | |
https://core.trac.wordpress.org/changeset/38168 | Issue Tracking Patch |
https://core.trac.wordpress.org/ticket/37490 | Issue Tracking |
https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html | Technical Description Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/08/20/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/96847 | |
https://core.trac.wordpress.org/changeset/38168 | Issue Tracking Patch |
https://core.trac.wordpress.org/ticket/37490 | Issue Tracking |
https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html | Technical Description Third Party Advisory |
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/08/20/1 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/96847 - | |
References | () https://core.trac.wordpress.org/changeset/38168 - Issue Tracking, Patch | |
References | () https://core.trac.wordpress.org/ticket/37490 - Issue Tracking | |
References | () https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html - Technical Description, Third Party Advisory |
Information
Published : 2017-01-18 21:59
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10148
Mitre link : CVE-2016-10148
CVE.ORG link : CVE-2016-10148
JSON object : View
Products Affected
wordpress
- wordpress