HTTP: WordPress Slider Revolution Responsive Plug-In Arbitrary File Download

This signature detects attempts to exploit known flaws in the Slider Revolution Responsive WordPress plug-in. A successful attack could result in arbitrary files being downloaded from the server, including sensitive system files containing system configuration files, administrative credentials, and server databases.

Extended Description

Directory traversal vulnerability in the Slider Revolution (revslider) plugin before 4.2 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php.

Affected Products

Themepunch slider_revolution

Short Name
HTTP:PHP:WP-SLIDER-REV-AFD
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Arbitrary CVE-2014-9734 Download File Plug-In Responsive Revolution Slider WordPress bid:68942
Release Date
09/01/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Themepunch

CVSS Score

5.0

Found a potential security threat?