exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Easy2Map 1.2.9 Local File Inclusion / Directory Traversal

WordPress Easy2Map 1.2.9 Local File Inclusion / Directory Traversal
Posted Oct 6, 2015
Authored by Iberia Medeiros

WordPress Easy2Map plugin version 1.2.9 suffers from local file inclusion and directory traversal vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
advisories | CVE-2015-7669
SHA-256 | 89fef2eb1e9eb1f0402391f86cf88a6187cef6759d3a1f9cfc03b88f6af502f4

WordPress Easy2Map 1.2.9 Local File Inclusion / Directory Traversal

Change Mirror Download
Vulnerability title: Multiple Path/Directory Traversal and/or Local File Inclusion in Easy2Map version 1.2.9 WordPress plugin
CVE: CVE-2015-7669
Vendor: Steven Ellis
Product: Easy2Map
Affected version: 1.2.9
Fixed version: 1.3.0
Reported by: Ibéria Medeiros

Vulnerability Details:
=====================
It was discovered that no protection against two Path/Directory Traversal (PT/DT) and/or Local File Inclusion (LFI) attacks was implemented, resulting in an attacker being able to access to files from website directory and/or file system directory (PT/DT); and/or access to files that were previously stored in computer victim, by a upload file functionality, then execute them in computer victim.

The Easy2Map version 1.2.9 WordPress plugin is vulnerable to 2 PT/DT and/or LFI vulnerabilities.
The includes/MapImportCSV2.php and includes/MapImportCSV.php files are vulnerable to Path or Directory Traversal (PT/DT) and/or Local File Inclusion (LFI) attacks via $_FILES["csvfile"]['tmp_name'] parameter.

System affected:
===============
Any system that access to a web site developed by WordPress CMS version 4.3.1 or earlier and uses the Easy2Map version 1.2.9 or earlier.

Advisory:
========
https://wordpress.org/plugins/easy2map/changelog/
item: "Increased data sanitization logic, for improved plugin security."

Solution:
========
Update to Easy2Map version 1.3.0 plugin.
https://wordpress.org/plugins/easy2map/

Disclosure Timeline:
===================
Vendor notification: September 22, 2015
Vendor fixed vulnerability: October 4, 2015
Public advisory: October 4, 2015
Public disclosure: October 4, 2015
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    20 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close