Vulnerability CVE-2012-3577


Published: 2012-06-16   Modified: 2012-06-17

Description:
Unrestricted file upload vulnerability in doupload.php in the Nmedia Member Conversation plugin before 1.4 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/user_uploads.

See advisories in our WLB2 database:
Topic
Author
Date
High
WordPress Nmedia WP Member Conversation 1.35.0 Shell Upload
Sammy FORGIT
06.06.2012

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Nmedia -> Member conversation 

 References:
http://xforce.iss.net/xforce/xfdb/76076
http://www.securityfocus.com/bid/53790
http://www.opensyscom.fr/Actualites/wordpress-plugins-nmedia-wordpress-member-conversation-shell-upload-vulnerability.html
http://wordpress.org/extend/plugins/wordpress-member-private-conversation/changelog/
http://secunia.com/advisories/49375
http://packetstormsecurity.org/files/113287/WordPress-Nmedia-WP-Member-Conversation-1.35.0-Shell-Upload.html

Copyright 2024, cxsecurity.com

 

Back to Top