ASA-201903-10 generated external raw

[ASA-201903-10] wordpress: directory traversal
Arch Linux Security Advisory ASA-201903-10 ========================================== Severity: High Date : 2019-03-18 CVE-ID : CVE-2019-8943 Package : wordpress Type : directory traversal Remote : Yes Link : https://security.archlinux.org/AVG-909 Summary ======= The package <a href="/package/wordpress">wordpress</a> before version 5.1-1 is vulnerable to directory traversal. Resolution ========== Upgrade to 5.1-1. # pacman -Syu "wordpress>=5.1-1" The problem has been fixed upstream in version 5.1. Workaround ========== None. Description =========== <a href="/package/wordpress">WordPress</a> through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. Impact ====== A remote attacker with image-cropping privileges can write files to an arbitrary directory References ========== https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/ https://security.archlinux.org/CVE-2019-8943