Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin before 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the directory specified by the folder parameter.
archives.neohapsis.com/archives/bugtraq/2012-01/0145.html
plugins.svn.wordpress.org/kish-guest-posting/trunk/readme.txt
plugins.trac.wordpress.org/changeset/403694/kish-guest-posting/trunk/uploadify/scripts/uploadify.php
secunia.com/advisories/47688
www.exploit-db.com/exploits/18412
www.openwall.com/lists/oss-security/2012/03/06/11
www.openwall.com/lists/oss-security/2012/03/06/3
www.openwall.com/lists/oss-security/2012/03/08/1
www.osvdb.org/78479
www.securityfocus.com/bid/51638
exchange.xforce.ibmcloud.com/vulnerabilities/79563