Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/37295 - | |
References | () http://secunia.com/advisories/25794 - Vendor Advisory | |
References | () http://trac.mu.wordpress.org/changeset/1005 - | |
References | () http://www.buayacorp.com/files/wordpress/wordpress-advisory.html - | |
References | () http://www.securityfocus.com/bid/24642 - |
Information
Published : 2007-07-03 20:30
Updated : 2024-11-21 00:33
NVD link : CVE-2007-3543
Mitre link : CVE-2007-3543
CVE.ORG link : CVE-2007-3543
JSON object : View
Products Affected
wordpress
- wordpress_mu
- wordpress
CWE