漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
WordPress 路径遍历漏洞
Vulnerability Description
WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。 WordPress 4.9.6及之前版本中的wp-admin/post.php文件的‘wp-admin/post.php’函数存在目录遍历漏洞,该漏洞源于程序没有验证文件名称。攻击者可利用该漏洞删除任意的WordPress安装文件,执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A