Nimble Streamer up to 3.0.4-9 on WordPress directory traversal – Digitalmunition




Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 24th, 2019 📆 | 7375 Views ⚑

0

Nimble Streamer up to 3.0.4-9 on WordPress directory traversal

CVSS Meta Temp ScoreCurrent Exploit Price (≈)
5.5$0-$5k

A vulnerability, which was classified as critical, was found in Nimble Streamer up to 3.0.4-9 on WordPress (WordPress Plugin). This affects an unknown code. The manipulation with the input value ../ leads to a directory traversal vulnerability. CWE is classifying the issue as CWE-22. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was published 08/22/2019. This vulnerability is uniquely identified as CVE-2019-11013 since 04/08/2019. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 08/23/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Type

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Directory traversal (CWE-22)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

04/08/2019 CVE assigned
08/22/2019 +136 days Advisory disclosed
08/23/2019 +1 days VulDB entry created
08/23/2019 +0 days VulDB last update
CVE: CVE-2019-11013 (🔒)Created: 08/23/2019 08:59 AM
Complete: 🔍

Download the whitepaper to learn more about our service!

https://vuldb.com/?id.140655

Tagged with:



Leave a Reply