Vulnerability Description
Directory traversal vulnerability in force-download.php in the Download Shortcode plugin 0.2.3 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Werdswords | Download Shortcode | <= 0.2.3 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/128024/WordPress-ShortCode-1.1-Local-File-IExploit
- http://wordpress.org/plugins/download-shortcode/changelog/Patch
- http://wordpress.org/support/topic/plugin-download-shortcode-security-issuePatchVendor Advisory
- http://wordpress.org/support/topic/vulnerability-5Patch
- http://www.exploit-db.com/exploits/34436Exploit
- http://www.securityfocus.com/bid/69440Exploit
- http://packetstormsecurity.com/files/128024/WordPress-ShortCode-1.1-Local-File-IExploit
- http://wordpress.org/plugins/download-shortcode/changelog/Patch
- http://wordpress.org/support/topic/plugin-download-shortcode-security-issuePatchVendor Advisory
- http://wordpress.org/support/topic/vulnerability-5Patch
- http://www.exploit-db.com/exploits/34436Exploit
- http://www.securityfocus.com/bid/69440Exploit
FAQ
What is CVE-2014-5465?
CVE-2014-5465 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in force-download.php in the Download Shortcode plugin 0.2.3 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file ...
How severe is CVE-2014-5465?
CVE-2014-5465 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-5465?
Check the references section above for vendor advisories and patch information. Affected products include: Werdswords Download Shortcode.