漏洞信息详情
WordPress 路径遍历漏洞
漏洞简介
WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。
WordPress 5.0.3及之前版本中的‘wp_crop_image()’函数存在路径遍历漏洞。远程攻击者可借助带有图像扩展名和‘../’序列的文件名利用该漏洞向任意目录写入图像。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
http://www.wordpress.org/
参考网址
来源:MISC
链接:http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
来源:blog.ripstech.com
链接:https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
来源:BID
链接:https://www.securityfocus.com/bid/107089
来源:EXPLOIT-DB
链接:https://www.exploit-db.com/exploits/46662/
来源:MISC
链接:https://packetstormsecurity.com/files/161213/WordPress-5.0.0-Remote-Code-Execution.html
来源:EXPLOIT-DB
链接:https://www.exploit-db.com/exploits/46511/
来源:http
链接:http/wp_crop_rce
来源:MISC
链接:http://www.rapid7.com/db/modules/exploit/multi/
来源:MISC
链接:https://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
来源:BID
链接:http://www.securityfocus.com/bid/107089
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/107089
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161213/WordPress-5.0.0-Remote-Code-Execution.html
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/46662
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-8943
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/WordPress-Core-directory-traversal-via-wp-crop-image-28561
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/46511
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...