Information disclosure in W3 Total Cache plugin for WordPress



Published: 2019-04-01 | Updated: 2019-05-07
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-6715
CWE-ID CWE-200
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
W3 Total Cache
Web applications / Modules and components for CMS

Vendor Frederick Townes

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Information disclosure

EUVDB-ID: #VU18405

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-6715

CWE-ID: CWE-200 - Information exposure

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to an error in pub/sns.php script. A remote attacker can read contents of arbitrary file on the system via the SubscribeURL field in SubscriptionConfirmation JSON data.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

W3 Total Cache: 0.9.0 - 0.9.3

External links

http://vinhjaxt.github.io/2019/03/cve-2019-6715


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###