ASA-201903-10 log generated external raw

[ASA-201903-10] wordpress: directory traversal
Arch Linux Security Advisory ASA-201903-10 ========================================== Severity: High Date : 2019-03-18 CVE-ID : CVE-2019-8943 Package : wordpress Type : directory traversal Remote : Yes Link : Summary ======= The package wordpress before version 5.1-1 is vulnerable to directory traversal. Resolution ========== Upgrade to 5.1-1. # pacman -Syu "wordpress>=5.1-1" The problem has been fixed upstream in version 5.1. Workaround ========== None. Description =========== WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. Impact ====== A remote attacker with image-cropping privileges can write files to an arbitrary directory References ==========