CVE-2016-10148 - Improper Access Control vulnerability in Wordpress
The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Theft An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
|NASL family||CGI abuses|
|description||According to its self-reported version number, the WordPress application running on the remote web server is prior to 4.6. It is, therefore, affected by multiple vulnerabilities : - A path traversal vulnerability exists in the WordPress Admin API in the wp_ajax_update_plugin() function in ajax-actions.php due to improper sanitization of user-supplied input. An authenticated, remote attacker can exploit this, via a specially crafted request, to cause a denial of service condition. (CVE-2016-6896) - A cross-site request forgery vulnerability (XSRF) exists in the admin-ajax.php script due to a failure to require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. An unauthenticated, remote attacker can exploit this, by convincing a user to follow a specially crafted link, to perform arbitrary AJAX updates. (CVE-2016-6897) - An information disclosure vulnerability exists in the wp_ajax_update_plugin() function in the ajax-actions.php script due to performing a call to get_plug_data() before checking capabilities. An authenticated, remote attacker can exploit this to bypass intended read-access restrictions, resulting in a disclosure of sensitive information. (CVE-2016-10148) Note that Nessus has not tested for these issues but has instead relied only on the application|
|reporter||This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.|
|title||WordPress < 4.6 Multiple Vulnerabilities|