CVE-2014-5368 Scanner
Detects 'Directory Traversal' vulnerability in Content Source Control plugin for Wordpress affects v. 3.0.0 and earlier.
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 2 days
Scan only one
URL
Toolbox
-
Content Source Control plugin for Wordpress is a tool that offers version control management for websites. It is designed to allow multiple users to work on a website, while keeping track of changes, and who made them. Its purpose is to streamline content management and facilitate collaboration among website administrators.
However, the plugin has a critical vulnerability, tracked under CVE-2014-5368. This vulnerability is a directory traversal exploit located within the downloadfiles/download.php file. This function allows attackers to read any file on the server that they have necessary permissions for. By adding "../../" to the beginning of the filename parameter in the download.php file, an attacker can access files outside of the plugin's intended directories. This exploit is available for exploitation in version 3.0.0 and earlier.
If this vulnerability is exploited successfully, the attacker can read sensitive information, and access personal data such as user accounts, financial records, and passwords. Moreover, an attacker can exploit this vulnerability to gain access to sensitive data for malicious activities such as blackmail and ransomware.
In conclusion, being aware of vulnerabilities and taking active measures to protect digital assets is a critical step in securing a website. s4e.io provides a comprehensive security solution that offers pro features to help identify, detect, and mitigate vulnerabilities in your digital assets. By leveraging this platform, website administrators can keep their websites safe and secure from potential attacks, and focus on their business operations with peace of mind.
REFERENCES