Directory traversal in the Media File Organizer (aka media-file-organizer) plugin 1.0.1 for WordPress lets an attacker get access to files that are stored outside the web root folder via the items[] parameter in a move operation.
References
Link | Resource |
---|---|
https://github.com/secwx/research/blob/main/cve/CVE-2020-24144.md | Third Party Advisory |
https://ru.wordpress.org/plugins/media-file-organizer/ | Vendor Advisory |
https://github.com/secwx/research/blob/main/cve/CVE-2020-24144.md | Third Party Advisory |
https://ru.wordpress.org/plugins/media-file-organizer/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-07-07 14:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24144
Mitre link : CVE-2020-24144
CVE.ORG link : CVE-2020-24144
JSON object : View
Products Affected
media_file_organizer_project
- media_file_organizer
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')