Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/4060 - | |
References | () http://www.securityfocus.com/bid/30365 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43987 - | |
References | () https://www.exploit-db.com/exploits/6127 - |
Information
Published : 2008-07-30 16:41
Updated : 2024-11-21 00:49
NVD link : CVE-2008-3362
Mitre link : CVE-2008-3362
CVE.ORG link : CVE-2008-3362
JSON object : View
Products Affected
wordpress
- wp_downloads_manager
giulio_ganci
- wp_downloads_manager
CWE
CWE-20
Improper Input Validation