Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. NOTE: this might be the same as CVE-2006-5705.1.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.debian.org/security/2008/dsa-1502 | vendor advisory |
http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html | mailing list exploit |
http://websecurity.com.ua/1676/ | |
http://www.securityfocus.com/bid/27123 | vdb entry |
http://www.securityfocus.com/archive/1/485786/100/0/threaded | mailing list |
http://securityvulns.ru/Sdocument755.html | |
http://securityreason.com/securityalert/3539 | third party advisory |
http://secunia.com/advisories/29014 | third party advisory |