In the WP Rocket plugin 2.9.3 for WordPress, the Local File Inclusion mitigation technique is to trim traversal characters (..) -- however, this is insufficient to stop remote attacks and can be bypassed by using 0x00 bytes, as demonstrated by a .%00.../.%00.../ attack.
References
Link | Resource |
---|---|
https://gist.github.com/Shinkurt/157dbb3767c9489f3d754f79b183a890 | Exploit Third Party Advisory |
https://wp-rocket.me/changelog | Release Notes Vendor Advisory |
https://wpvulndb.com/vulnerabilities/8872 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-07-26 15:29
Updated : 2017-08-04 14:20
NVD link : CVE-2017-11658
Mitre link : CVE-2017-11658
CVE.ORG link : CVE-2017-11658
JSON object : View
Products Affected
wp-rocket
- wp-rocket
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')