CVE-2021-39316

The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:digitalzoomstudio:zoomsounds:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39316 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39316 - Third Party Advisory

Information

Published : 2021-08-31 12:15

Updated : 2024-11-21 06:19


NVD link : CVE-2021-39316

Mitre link : CVE-2021-39316

CVE.ORG link : CVE-2021-39316


JSON object : View

Products Affected

digitalzoomstudio

  • zoomsounds
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-552

Files or Directories Accessible to External Parties