5
CVSSv2

CVE-2017-17058

Published: 29/11/2017 Updated: 11/04/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The WooCommerce plugin up to and including 3.x for WordPress has a Directory Traversal Vulnerability via a /wp-content/plugins/woocommerce/templates/emails/plain/ URI, which accesses a parent directory. NOTE: a software maintainer indicates that Directory Traversal is not possible because all of the template files have "if (!defined('ABSPATH')) {exit;}" code

Vulnerable Product Search on Vulmon Subscribe to Product

automattic woocommerce

Exploits

# Exploit Title: WordPress woocommerce directory traversal # Date: 28-11-2017 # Software Link: wordpressorg/plugins/woocommerce/ # Exploit Author:fu2x2000 # Contact: fu2x2000@gmailcom # Website: # CVE:2017-17058 #Version:Tested on WordPress 483 woocommerce 20/30 # Category: webapps 1 Description Identifying woo commerce theme plu ...