Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin before 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the directory specified by the folder parameter.
Link | Tags |
---|---|
http://secunia.com/advisories/47688 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2012/03/08/1 | mailing list |
http://plugins.trac.wordpress.org/changeset/403694/kish-guest-posting/trunk/uploadify/scripts/uploadify.php | |
http://www.openwall.com/lists/oss-security/2012/03/06/11 | mailing list |
http://plugins.svn.wordpress.org/kish-guest-posting/trunk/readme.txt | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79563 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/03/06/3 | mailing list |
http://www.securityfocus.com/bid/51638 | vdb entry exploit |
http://archives.neohapsis.com/archives/bugtraq/2012-01/0145.html | mailing list exploit |
http://www.exploit-db.com/exploits/18412 | exploit |
http://www.osvdb.org/78479 | vdb entry |