CVE-2014-5368 Scanner

Detects 'Directory Traversal' vulnerability in Content Source Control plugin for Wordpress affects v. 3.0.0 and earlier.

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 month 2 days

Scan only one

URL

Toolbox

-

Content Source Control plugin for Wordpress is a tool that offers version control management for websites. It is designed to allow multiple users to work on a website, while keeping track of changes, and who made them. Its purpose is to streamline content management and facilitate collaboration among website administrators. 

However, the plugin has a critical vulnerability, tracked under CVE-2014-5368. This vulnerability is a directory traversal exploit located within the downloadfiles/download.php file. This function allows attackers to read any file on the server that they have necessary permissions for. By adding "../../" to the beginning of the filename parameter in the download.php file, an attacker can access files outside of the plugin's intended directories. This exploit is available for exploitation in version 3.0.0 and earlier.

If this vulnerability is exploited successfully, the attacker can read sensitive information, and access personal data such as user accounts, financial records, and passwords. Moreover, an attacker can exploit this vulnerability to gain access to sensitive data for malicious activities such as blackmail and ransomware.

In conclusion, being aware of vulnerabilities and taking active measures to protect digital assets is a critical step in securing a website. s4e.io provides a comprehensive security solution that offers pro features to help identify, detect, and mitigate vulnerabilities in your digital assets. By leveraging this platform, website administrators can keep their websites safe and secure from potential attacks, and focus on their business operations with peace of mind.

 

REFERENCES

Get started to protecting your Free Full Security Scan