Vulnerabilites related to FWDesign - MP3 Sticky Player
CVE-2024-10803 (GCVE-0-2024-10803)
Vulnerability from cvelistv5
Published
2024-11-23 07:38
Modified
2024-11-26 16:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
The MP3 Sticky Player plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 8.0 via the content/downloader.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. Please note the vendor released the patched version as the same version as the affected version.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FWDesign | MP3 Sticky Player |
Version: * ≤ 8.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fwdesign:mp3_sticky_player:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mp3_sticky_player", "vendor": "fwdesign", "versions": [ { "lessThanOrEqual": "8.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10803", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T16:29:08.370300Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T16:31:04.149Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "MP3 Sticky Player", "vendor": "FWDesign", "versions": [ { "lessThanOrEqual": "8.0", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Tonn" } ], "descriptions": [ { "lang": "en", "value": "The MP3 Sticky Player plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 8.0 via the content/downloader.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. Please note the vendor released the patched version as the same version as the affected version." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-23T07:38:04.688Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bcd4675-e930-44d9-8278-c4c9e877656a?source=cve" }, { "url": "https://codecanyon.net/item/mp3-sticky-player-wordpress-plugin/7930491" } ], "timeline": [ { "lang": "en", "time": "2024-11-22T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "MP3 Sticky Player \u003c= 8.0 - Unauthenticated Arbitrary File Read/Download" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-10803", "datePublished": "2024-11-23T07:38:04.688Z", "dateReserved": "2024-11-04T16:59:29.662Z", "dateUpdated": "2024-11-26T16:31:04.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }