Vulnerability Description
inc/logger.php in the Giribaz File Manager plugin before 5.0.2 for WordPress logged activity related to the plugin in /wp-content/uploads/file-manager/log.txt. If a user edits the wp-config.php file using this plugin, the wp-config.php contents get added to log.txt, which is not protected and contains database credentials, salts, etc. These files have been indexed by Google and a simple dork will find affected sites.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Giribaz | File Manager | <= 5.0.0 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/1823035/file-managerPatchThird Party Advisory
- https://wordpress.org/plugins/file-manager/#developersThird Party Advisory
- https://wpvulndb.com/vulnerabilities/9036Third Party Advisory
- https://plugins.trac.wordpress.org/changeset/1823035/file-managerPatchThird Party Advisory
- https://wordpress.org/plugins/file-manager/#developersThird Party Advisory
- https://wpvulndb.com/vulnerabilities/9036Third Party Advisory
FAQ
What is CVE-2018-7204?
CVE-2018-7204 is a vulnerability with a CVSS score of 7.5 (HIGH). inc/logger.php in the Giribaz File Manager plugin before 5.0.2 for WordPress logged activity related to the plugin in /wp-content/uploads/file-manager/log.txt. If a user edits the wp-config.php file u...
How severe is CVE-2018-7204?
CVE-2018-7204 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7204?
Check the references section above for vendor advisories and patch information. Affected products include: Giribaz File Manager.