SB2019052706 - Path traversal in Simple File List plugin for WordPress
Published: May 27, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Path traversal (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences passed via the "eeDeleteFile[]" HTTP POST parameter. A remote authenticated attacker can send a specially crafted HTTP request and delete arbitrary files on the system.
2) Path traversal (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences passed via the "eeSFL_File" HTTP GET parameter to "/wp-content/plugins/simple-file-list/includes/ee-download.php". A remote unauthenticated attacker can send a specially crafted HTTP request and download arbitrary files from the system.
Remediation
Install update from vendor's website.