CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2015-1000008 Wordpress MP3-jPlayer "download.php" Path Disclosure Vulnerability

2016年10月21日 1381点热度 0人点赞 0条评论

漏洞类别:CGI

漏洞等级:

漏洞信息

WordPress is an open source blogging tool and content management system based on PHP and MySQL. It has many features including a plug-in architecture and a template system. MP3-jPlayer is an audio plugin for WordPress.

The "mp3-jplayer/download.php" source file that is implemented in the affected versions of the WordPress MP3-jPlayer plugin fails to properly sanitize user supplied input received via the "mp3" parameter. A remote unauthenticated attacker could exploit this vulnerability by transmitting a malicious GET request directed at the script file, disclosing sensitive installation path.

Affected Versions:
WordPress MP3-jPlayer plugin versions 2.3.2 and prior

漏洞危害

Successful exploitation allows remote, unauthenticated attackers to disclose the WordPress installation path resulting in a loss of confidentiality.

解决方案

Customers are advised to download and install WordPress MP3-jPlayer plugin 2.3.3 or later versions to remediate this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

MP3-jPlayer plugin 2.3.3 or later

0day

标签: 暂无
最后更新:2016年10月22日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me