Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:article2pdf_project:article2pdf:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D3B3E35F-FFE5-4C4C-9B62-020C17E19774", "versionEndIncluding": "0.27", "versionStartIncluding": "0.24", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An Information Disclosure / Data Modification issue exists in article2pdf_getfile.php in the article2pdf Wordpress plugin 0.24, 0.25, 0.26, 0.27. A URL can be constructed which allows overriding the PDF file's path leading to any PDF whose path is known and which is readable to the web server can be downloaded. The file will be deleted after download if the web server has permission to do so. For PHP versions before 5.3, any file can be read by null terminating the string left of the file extension."}, {"lang": "es", "value": "Existe un problema de divulgaci\u00f3n de informaci\u00f3n y modificaci\u00f3n de datos en article2pdf_getfile.php en el plugin article2pdf para WordPress, en versiones 0.24, 0.25, 0.26 y 0.27. Se puede construir una URL, lo que permite la sobrescritura de la ruta del archivo PDF. Esto provoca que se pueda descargar cualquier PDF cuya ruta sea conocida y que pueda ser le\u00edda por el servidor web. El archivo ser\u00e1 eliminado tras la descarga si el servidor web tiene permisos para hacerlo. Para las versiones anteriores a la 5.3 de PHP, cualquier archivo puede ser le\u00eddo terminando en null la cadena remanente de la extensi\u00f3n de archivo."}], "id": "CVE-2019-1010257", "lastModified": "2024-11-21T04:18:06.107", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-03-27T19:30:11.663", "references": [{"source": "josh@bress.net", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "https://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html"}, {"source": "josh@bress.net", "tags": ["Exploit", "Issue Tracking", "Mailing List", "Third Party Advisory"], "url": "https://seclists.org/bugtraq/2019/Mar/49"}, {"source": "josh@bress.net", "tags": ["Third Party Advisory"], "url": "https://wordpress.org/support/topic/pdf-download-path-improperly-sanitised/"}, {"source": "josh@bress.net", "tags": ["Third Party Advisory"], "url": "https://wpvulndb.com/vulnerabilities/9246"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "url": "https://packetstormsecurity.com/files/152236/WordPress-article2pdf-0.24-DoS-File-Deletion-Disclosure.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Issue Tracking", "Mailing List", "Third Party Advisory"], "url": "https://seclists.org/bugtraq/2019/Mar/49"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://wordpress.org/support/topic/pdf-download-path-improperly-sanitised/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://wpvulndb.com/vulnerabilities/9246"}], "sourceIdentifier": "josh@bress.net", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}