Vulnerability Description
Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mikoviny | Wp Custom Pages | 0.5.0.1 |
| Wordpress | Wordpress | All versions |
Related Weaknesses (CWE)
References
- http://osvdb.org/71707
- http://secunia.com/advisories/43963Vendor Advisory
- http://www.autosectools.com/Advisories/WordPress.WP.Custom.Pages.0.5.0.1_Local.FExploit
- http://www.exploit-db.com/exploits/17119Exploit
- http://www.securityfocus.com/bid/47146ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66559
- http://osvdb.org/71707
- http://secunia.com/advisories/43963Vendor Advisory
- http://www.autosectools.com/Advisories/WordPress.WP.Custom.Pages.0.5.0.1_Local.FExploit
- http://www.exploit-db.com/exploits/17119Exploit
- http://www.securityfocus.com/bid/47146ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66559
FAQ
What is CVE-2011-1669?
CVE-2011-1669 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the ur...
How severe is CVE-2011-1669?
CVE-2011-1669 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1669?
Check the references section above for vendor advisories and patch information. Affected products include: Mikoviny Wp Custom Pages, Wordpress Wordpress.