Path traversal in Ad Inserter plugin for WordPress



Published: 2019-07-12 | Updated: 2019-08-28
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-15323
CWE-ID CWE-22
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Ad Inserter – Ad Manager & AdSense Ads
Web applications / Modules and components for CMS

Vendor Igor Funa

Security Bulletin

This security bulletin contains information about 1 vulnerabilities.

Updated: 28.08.2019
Assigned CVE-ID.

1) Path traversal

EUVDB-ID: #VU19194

Risk: Low

CVSSv3.1: 2.5 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-15323

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to improper sanitization of the "image" and "css" parameters in the " ai_ajax_backend" AJAX request. A remote authenticated administrator can send a specially crafted HTTP request to the plugin page in admin panel and read arbitrary files on the server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Ad Inserter – Ad Manager & AdSense Ads: 2.0.3 - 2.4.19

External links

http://www.synacktiv.com/ressources/advisories/WordPress_ad_inserter.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###