The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
References
Link | Resource |
---|---|
https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html | Technical Description Third Party Advisory |
https://core.trac.wordpress.org/ticket/37490 | Issue Tracking |
https://core.trac.wordpress.org/changeset/38168 | Issue Tracking Patch |
http://www.openwall.com/lists/oss-security/2016/08/20/1 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/96847 |
Configurations
Information
Published : 2017-01-18 13:59
Updated : 2017-03-15 18:59
NVD link : CVE-2016-10148
Mitre link : CVE-2016-10148
JSON object : View
Products Affected
wordpress
- wordpress