First published: Thu Mar 06 2014(Updated: )
Multiple directory traversal vulnerabilities in the VideoWhisper Live Streaming Integration plugin before 4.29.5 for WordPress allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the s parameter to ls/rtmp_login.php or (2) delete arbitrary files via a .. (dot dot) in the s parameter to ls/rtmp_logout.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VideoWhisper Live Streaming Integration | <=4.27.4 | |
VideoWhisper Live Streaming Integration | =1.0.2 | |
VideoWhisper Live Streaming Integration | =2.0 | |
VideoWhisper Live Streaming Integration | =2.1 | |
VideoWhisper Live Streaming Integration | =2.2 | |
VideoWhisper Live Streaming Integration | =4.05 | |
VideoWhisper Live Streaming Integration | =4.07 | |
VideoWhisper Live Streaming Integration | =4.25 | |
VideoWhisper Live Streaming Integration | =4.25.3 | |
VideoWhisper Live Streaming Integration | =4.27 | |
VideoWhisper Live Streaming Integration | =4.27.3 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1907 has a moderate severity level due to its directory traversal vulnerabilities that allow file access and deletion.
To fix CVE-2014-1907, update the VideoWhisper Live Streaming Integration plugin to version 4.29.5 or later.
CVE-2014-1907 affects VideoWhisper Live Streaming Integration plugin versions prior to 4.29.5, including versions 1.0.2, 2.0, 2.1, 2.2, 4.05, 4.07, 4.25, 4.25.3, and 4.27.
Yes, CVE-2014-1907 can be exploited remotely by attackers with crafted requests allowing file reading and deletion.
CVE-2014-1907 enables directory traversal attacks that can lead to unauthorized file access and potential denial of service through file deletion.