Vulnerability CVE-2013-7102


Published: 2013-12-23   Modified: 2013-12-24

Description:
Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Optimizepress -> Optimizepress 

 References:
http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/
http://seclists.org/fulldisclosure/2013/Dec/127
http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update
http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html

Copyright 2024, cxsecurity.com

 

Back to Top