Vulnerability Description
Absolute path traversal vulnerability in mysqldump_download.php in the WordPress Rename plugin 1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the dumpfname parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rename Project | Rename | 1.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/132460/WordPress-WP-Instance-Rename-1.0-FilExploitPatch
- http://www.openwall.com/lists/oss-security/2015/06/23/5ExploitPatch
- http://www.securityfocus.com/bid/75394
- http://www.vapid.dhs.org/advisory.php?v=127Exploit
- https://wpvulndb.com/vulnerabilities/8055Exploit
- http://packetstormsecurity.com/files/132460/WordPress-WP-Instance-Rename-1.0-FilExploitPatch
- http://www.openwall.com/lists/oss-security/2015/06/23/5ExploitPatch
- http://www.securityfocus.com/bid/75394
- http://www.vapid.dhs.org/advisory.php?v=127Exploit
- https://wpvulndb.com/vulnerabilities/8055Exploit
FAQ
What is CVE-2015-4703?
CVE-2015-4703 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Absolute path traversal vulnerability in mysqldump_download.php in the WordPress Rename plugin 1.0 for WordPress allows remote attackers to read arbitrary files via a full pathname in the dumpfname pa...
How severe is CVE-2015-4703?
CVE-2015-4703 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4703?
Check the references section above for vendor advisories and patch information. Affected products include: Rename Project Rename.