The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability 17406

WordPress WP Attachment Export: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of WordPress WP Attachment Export, in order to read a file outside the service root path.
Severity of this weakness: 2/4.
Creation date: 15/07/2015.
Références of this bulletin: VIGILANCE-VUL-17406.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The WP Attachment Export plugin can be installed on WordPress.

However, user's data are directly inserted in an access path. Sequences such as "/.." can thus be used to go in the upper directory.

An attacker can therefore traverse directories of WordPress WP Attachment Export, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

This security announce impacts software or systems such as WordPress Plugins ~ not comprehensive.

Our Vigil@nce team determined that the severity of this threat is medium.

The trust level is of type confirmed by the editor, with an origin of internet client.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this computer vulnerability announce.

Solutions for this threat

WordPress WP Attachment Export: version 0.2.4.
The version 0.2.4 is fixed:
  https://wordpress.org/plugins/wp-attachment-export/
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides an application vulnerability announce. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.