In the WP Rocket plugin 2.9.3 for WordPress, the Local File Inclusion mitigation technique is to trim traversal characters (..) -- however, this is insufficient to stop remote attacks and can be bypassed by using 0x00 bytes, as demonstrated by a .%00.../.%00.../ attack.
References
Link | Resource |
---|---|
https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 | Exploit Third Party Advisory |
https://wp-rocket.me/changelog | Release Notes Vendor Advisory |
https://wpvulndb.com/vulnerabilities/8872 | Third Party Advisory VDB Entry |
https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 | Exploit Third Party Advisory |
https://wp-rocket.me/changelog | Release Notes Vendor Advisory |
https://wpvulndb.com/vulnerabilities/8872 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 - Exploit, Third Party Advisory | |
References | () https://wp-rocket.me/changelog - Release Notes, Vendor Advisory | |
References | () https://wpvulndb.com/vulnerabilities/8872 - Third Party Advisory, VDB Entry |
Information
Published : 2017-07-26 15:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11658
Mitre link : CVE-2017-11658
CVE.ORG link : CVE-2017-11658
JSON object : View
Products Affected
wp-rocket
- wp-rocket
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')