ArchLinux: 201903-10: wordpress: directory traversal

    Date20 Mar 2019
    CategoryArchLinux
    390
    Posted ByLinuxSecurity Advisories
    The package wordpress before version 5.1-1 is vulnerable to directory traversal.
    Arch Linux Security Advisory ASA-201903-10
    ==========================================
    
    Severity: High
    Date    : 2019-03-18
    CVE-ID  : CVE-2019-8943
    Package : wordpress
    Type    : directory traversal
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-909
    
    Summary
    =======
    
    The package wordpress before version 5.1-1 is vulnerable to directory
    traversal.
    
    Resolution
    ==========
    
    Upgrade to 5.1-1.
    
    # pacman -Syu "wordpress>=5.1-1"
    
    The problem has been fixed upstream in version 5.1.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An
    attacker (who has privileges to crop an image) can write the output
    image to an arbitrary directory via a filename containing two image
    extensions and ../ sequences, such as a filename ending with the
    .jpg?/../../file.jpg substring.
    
    Impact
    ======
    
    A remote attacker with image-cropping privileges can write files to an
    arbitrary directory
    
    References
    ==========
    
    https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
    https://security.archlinux.org/CVE-2019-8943
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":62.5,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.