WordPress Guest Posting Plugin 'uploadify.php' Arbitrary File Upload Vulnerability
BID:51638
Info
WordPress Guest Posting Plugin 'uploadify.php' Arbitrary File Upload Vulnerability
| Bugtraq ID: | 51638 |
| Class: | Input Validation Error |
| CVE: |
CVE-2012-1125 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 23 2012 12:00AM |
| Updated: | Oct 10 2012 06:10PM |
| Credit: | EgiX |
| Vulnerable: |
KishPress Guest Posting 1.0 |
| Not Vulnerable: | |
Discussion
WordPress Guest Posting Plugin 'uploadify.php' Arbitrary File Upload Vulnerability
The Guest Posting plugin is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
Guest Posting 1.0 is vulnerable; other versions may also be affected.
The Guest Posting plugin is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
Guest Posting 1.0 is vulnerable; other versions may also be affected.
Exploit / POC
WordPress Guest Posting Plugin 'uploadify.php' Arbitrary File Upload Vulnerability
Attackers can exploit this issue through a browser.
The following exploit is available:
Attackers can exploit this issue through a browser.
The following exploit is available: