Vulnerability CVE-2014-5460


Published: 2014-09-11

Description:
Unrestricted file upload vulnerability in the Tribulant Slideshow Gallery plugin before 1.4.7 for WordPress allows remote authenticated users to execute arbitrary code by uploading a PHP file, then accessing it via a direct request to the file in wp-content/uploads/slideshow-gallery/.

See advisories in our WLB2 database:
Topic
Author
Date
High
WordPress SlideShow Gallery Authenticated File Upload
Roberto Soares E...
21.04.2015

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Tribulant -> Tibulant slideshow gallery 

 References:
http://packetstormsecurity.com/files/128069/WordPress-Slideshow-Gallery-1.4.6-Shell-Upload.html
http://whitexploit.blogspot.mx/2014/08/wordpress-slideshow-gallery-146-shell.html
http://www.exploit-db.com/exploits/34514
http://www.exploit-db.com/exploits/34681
http://www.securityfocus.com/archive/1/533281/100/0/threaded
https://exchange.xforce.ibmcloud.com/vulnerabilities/95676
https://wordpress.org/plugins/slideshow-gallery/changelog

Copyright 2024, cxsecurity.com

 

Back to Top