In the WP Rocket plugin 2.9.3 for WordPress, the Local File Inclusion mitigation technique is to trim traversal characters (..) -- however, this is insufficient to stop remote attacks and can be bypassed by using 0x00 bytes, as demonstrated by a .%00.../.%00.../ attack.
References
Link Resource
https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 Exploit Third Party Advisory
https://wp-rocket.me/changelog Release Notes Vendor Advisory
https://wpvulndb.com/vulnerabilities/8872 Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-07-26T15:00:00

Updated: 2017-07-29T09:57:01

Reserved: 2017-07-26T00:00:00


Link: CVE-2017-11658

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-07-26T15:29:00.250

Modified: 2017-08-04T14:20:44.010


Link: CVE-2017-11658

JSON object: View

cve-icon Redhat Information

No data.

CWE