The nelio-ab-testing plugin before 4.5.0 for WordPress has filename=..%2f directory traversal.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://wpvulndb.com/vulnerabilities/8491 | third party advisory |
https://wordpress.org/plugins/nelio-ab-testing/#developers | release notes |
https://www.openwall.com/lists/oss-security/2016/05/10/1 | mailing list exploit third party advisory |