The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function in all versions up to, and including, 5.11.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Attack Parameters
Attack Vector
Network
Атака возможна удалённо
Attack Complexity
Low
Легко эксплуатировать
Privileges Required
High
Нужны права администратора
User Interaction
None
Не нужно действие пользователя
Impact Assessment
Confidentiality
High
Полная утечка данных
Integrity
High
Полная модификация данных
Availability
High
Полный отказ в обслуживании
CVSS Vector v3.1
Weakness Type (CWE)
References 5
https://github.com/wpmetabox/meta-box/pull/1654
security@wordfence.com
https://plugins.trac.wordpress.org/browser/meta-box/tags/5.11.0/inc/fields/file…
security@wordfence.com
https://plugins.trac.wordpress.org/browser/meta-box/tags/5.11.0/inc/fields/file…
security@wordfence.com
https://plugins.trac.wordpress.org/changeset/3475210/meta-box#file3
security@wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/036467de-95bb-4bfd-95…
security@wordfence.com