Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-8942
HistoryFeb 20, 2019 - 12:00 a.m.

CVE-2019-8942

2019-02-2000:00:00
ubuntu.com
ubuntu.com
53

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.943

Percentile

99.3%

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution
because an _wp_attached_file Post Meta entry can be changed to an arbitrary
string, such as one ending with a .jpg?file.php substring. An attacker with
author privileges can execute arbitrary code by uploading a crafted image
containing PHP code in the Exif metadata. Exploitation can leverage
CVE-2019-8943.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchwordpress< anyUNKNOWN
ubuntu16.04noarchwordpress< anyUNKNOWN

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

EPSS

0.943

Percentile

99.3%