CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
92.2%
Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin before 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the directory specified by the folder parameter.
Vendor | Product | Version | CPE |
---|---|---|---|
kishore_asokan | kish_guest_posting_plugin | * | cpe:2.3:a:kishore_asokan:kish_guest_posting_plugin:*:*:*:*:*:*:*:* |
kishore_asokan | kish_guest_posting_plugin | 1.0 | cpe:2.3:a:kishore_asokan:kish_guest_posting_plugin:1.0:*:*:*:*:*:*:* |
wordpress | wordpress | - | cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:* |
archives.neohapsis.com/archives/bugtraq/2012-01/0145.html
plugins.svn.wordpress.org/kish-guest-posting/trunk/readme.txt
plugins.trac.wordpress.org/changeset/403694/kish-guest-posting/trunk/uploadify/scripts/uploadify.php
secunia.com/advisories/47688
www.exploit-db.com/exploits/18412
www.openwall.com/lists/oss-security/2012/03/06/11
www.openwall.com/lists/oss-security/2012/03/06/3
www.openwall.com/lists/oss-security/2012/03/08/1
www.osvdb.org/78479
www.securityfocus.com/bid/51638
exchange.xforce.ibmcloud.com/vulnerabilities/79563