cve/2016/CVE-2016-10148.md

18 lines
882 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-10148](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10148)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
### POC
#### Reference
- https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html
#### Github
- https://github.com/JNado/CST312-WordPressExploits