CVE-2018-12895
WordPress Core < 4.9.7 - Authenticated Arbitrary File Deletion
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.
WordPress hasta la versión 4.9.6 permite que los usuarios Author ejecuten código arbitrario aprovechándose de un salto de directorio en el parámetro thumb en wp-admin/post.php que se pasa a la función unlink en PHP y puede borrar el archivo wp-config.php. Esto está relacionado con la ausencia de validación de nombres de archivo en la función wp_delete_attachment en wp-includes/post.php. El atacante debe tener capacidades para archivos y publicaciones que normalmente están disponibles solo para los roles Author, Editor y Administrator. La metodología de ataque es borrar wp-config.php y luego ejecutar un proceso de instalación nuevo para incrementar los privilegios del atacante.
WordPress versions 4.9.6 and below suffer from an arbitrary file deletion vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-26 CVE Reserved
- 2018-06-26 CVE Published
- 2024-07-11 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/104569 | Third Party Advisory | |
https://blog.ripstech.com/2018/wordpress-file-delete-to-code-execution | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00046.html | Mailing List | |
https://wpvulndb.com/vulnerabilities/9100 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
http://packetstormsecurity.com/files/164633/WordPress-4.9.6-Arbitrary-File-Deletion.html | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.debian.org/security/2018/dsa-4250 | 2021-11-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | < 4.9.7 Search vendor "Wordpress" for product "Wordpress" and version " < 4.9.7" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|