actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote attackers to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.exploit-db.com/exploits/18407 | exploit |
http://www.securityfocus.com/bid/51615 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72640 | vdb entry |
http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/ | patch |
http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html | mailing list exploit |
http://secunia.com/advisories/47659 | third party advisory vendor advisory |