Vulnerability CVE-2008-3362


Published: 2008-07-30   Modified: 2012-02-12

Description:
Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.

See advisories in our WLB2 database:
Topic
Author
Date
High
Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit
SaO
31.07.2008

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Wordpress -> Wp downloads manager 
Giulio ganci -> Wp downloads manager 

 References:
http://xforce.iss.net/xforce/xfdb/43987
http://www.securityfocus.com/bid/30365
http://www.milw0rm.com/exploits/6127
http://securityreason.com/securityalert/4060

Copyright 2024, cxsecurity.com

 

Back to Top