An Information Disclosure / Data Modification issue exists in article2pdf_getfile.php in the article2pdf Wordpress plugin 0.24, 0.25, 0.26, 0.27. A URL can be constructed which allows overriding the PDF file's path leading to any PDF whose path is known and which is readable to the web server can be downloaded. The file will be deleted after download if the web server has permission to do so. For PHP versions before 5.3, any file can be read by null terminating the string left of the file extension.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html | Exploit Third Party Advisory VDB Entry |
https://seclists.org/bugtraq/2019/Mar/49 | Exploit Issue Tracking Mailing List Third Party Advisory |
https://wordpress.org/support/topic/pdf-download-path-improperly-sanitised/ | Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9246 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: dwf
Published: 2019-03-27T18:07:57
Updated: 2019-08-03T20:06:03
Reserved: 2019-03-20T00:00:00
Link: CVE-2019-1010257
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-03-27T19:30:11.663
Modified: 2023-02-28T20:46:03.670
Link: CVE-2019-1010257
JSON object: View
Redhat Information
No data.
CWE