W3 Total Cache Plugin for WordPress Cache File Direct Request Information Disclosure

medium Nessus Plugin ID 64991

Synopsis

The remote web server contains a PHP script that is affected by an information disclosure vulnerability.

Description

The W3 Total Cache Plugin for WordPress installed on the remote host is affected by an information disclosure vulnerability because it stores cache files in a publicly accessible directory. If directory browsing is enabled on a web server, an attacker can browse to /wp-content/w3tc/dbcache and access the database cache files.

The database cache files can store information such as usernames and passwords and can disclose additional sensitive information. If directory browsing is not enabled, an attacker can still attempt to brute-force the names of the directories and files to view cached database queries and results.

Solution

Upgrade to version 0.9.2.5 or later.

See Also

https://seclists.org/fulldisclosure/2012/Dec/242

https://wordpress.org/plugins/w3-total-cache/#changelog

Plugin Details

Severity: Medium

ID: 64991

File Name: wordpress_w3_total_cache_info_disclosure.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 3/4/2013

Updated: 6/6/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 12/29/2012

Vulnerability Publication Date: 12/24/2012

Exploitable With

Metasploit (W3-Total-Cache Wordpress-plugin 0.9.2.4 (or before) Username and Hash Extract)