# Opvius AI for WooCommerce 路径遍历漏洞
## 概述
Integration Opvius AI for WooCommerce 插件中的 `process_table_bulk_actions()` 函数存在路径遍历漏洞。
## 影响版本
所有版本至 1.3.0(含)。
## 细节
该函数在处理用户提供的文件路径时,未进行身份验证、nonce 验证或路径合法性校验。攻击者可通过 `wsaw-log[]` POST 参数提交恶意路径。
## 影响
未经身份验证的攻击者可利用该漏洞删除或下载服务器上的任意文件,包括删除 `wp-config.php` 等关键文件或读取敏感配置信息。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: ERROR: The request could not be satisfied -- 🔗来源链接
标签:
神龙速读:
### 关键信息
- **HTTP Status**:
- 403 ERROR
- **Error Message**:
- The request could not be satisfied.
- **Reason**:
- Request blocked. We can't connect to the server for this app or website at this time. There might be too much traffic or a configuration error. Try again later, or contact the app or website owner.
- **Additional Information**:
- If you provide content to customers through CloudFront, you can find steps to troubleshoot and help prevent this error by reviewing the CloudFront documentation.
- **Generated by**:
- cloudfront (CloudFront)
- **Request ID**:
- rxFfwI66BCc9nDwi37wOBmWCIPI0QrVbClVYnTWE_IA8bDk09sIH0eg==
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.