| |
Vulnerability CVE-2021-24252
Published: 2021-05-06
Description: |
The Event Banner WordPress plugin through 1.3 does not verify the uploaded image file, allowing admin accounts to upload arbitrary files, such as .exe, .php, or others executable, leading to RCE. Due to the lack of CSRF check, the issue can also be used via such vector to achieve the same result, or via a LFI as authorisation checks are missing (but would require WP to be loaded) |
Type:
CWE-434 (Unrestricted Upload of File with Dangerous Type)
CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.5/10 |
6.4/10 |
8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
Partial |
References: |
https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/Event%20Banner.md
https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|