漏洞描述
The mTheme-Unus theme for WordPress, prior to version 2.3, contained a directory traversal flaw that let attackers access arbitrary files. This was possible by exploiting the files parameter in css/css.php with .. sequences.
id: CVE-2015-9406
info:
name: mTheme Unus < 2.3 - Directory Traversal
author: pussycat0x
severity: high
description: |
The mTheme-Unus theme for WordPress, prior to version 2.3, contained a directory traversal flaw that let attackers access arbitrary files. This was possible by exploiting the files parameter in css/css.php with .. sequences.
remediation: Upgrade to 2.3 or later version
reference:
- https://wpscan.com/vulnerability/d54b6b63-f280-412e-8c8f-17186727ac36/
- https://wpvulndb.com/vulnerabilities/9890
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2015-9406
cwe-id: CWE-22
epss-score: 0.42085
epss-percentile: 0.97359
cpe: cpe:2.3:a:mtheme-unus_project:mtheme-unus:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
vendor: mtheme-unus_project
product: mtheme-unus
framework: wordpress
fofa-query: 'body="wp-content/themes/mTheme-Unus/"'
tags: cve,cve2015,wordpress,wp-theme,wp,wpscan,mtheme-unus,passive,vkev
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/themes/mTheme-Unus/style.css"
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "compare_versions(version, '< 2.3')"
- "contains(body, 'mTheme-Unus')"
condition: and
extractors:
- type: regex
part: body
group: 1
name: version
regex:
- 'Version: ([0-9.]+)'
internal: true
# digest: 490a00463044022001c7e544031e17999de69abb99edb180adbda2b949a42789a8b0ba77933c20b6022011831bdec5607f8ede9b03b111fde813ad87f3c30cdcd495c836ba2a2518dc77:922c64590222798bb761d5b6d8e72950