Unrestricted file upload vulnerability in upload.php in the Powerplay Gallery plugin 3.3 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in *_uploadfolder/big/.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2015/07/20/1 | mailing list exploit |
http://www.vapid.dhs.org/advisory.php?v=132 | exploit |
http://seclists.org/fulldisclosure/2015/Jul/64 | mailing list exploit |
http://www.openwall.com/lists/oss-security/2015/07/27/8 | mailing list exploit |
http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html | exploit |