Directory traversal vulnerability in the wpajaxupdate_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
{
"binaries": [
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-l10n"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-theme-twentyfifteen"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-theme-twentyfourteen"
},
{
"binary_version": "4.4.2+dfsg-1ubuntu1",
"binary_name": "wordpress-theme-twentysixteen"
}
]
}