CVE-2009-3890

Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0142.html Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0149.html Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0153.html Broken Link
http://core.trac.wordpress.org/ticket/11122 Issue Tracking Vendor Advisory
http://secunia.com/advisories/37332 Third Party Advisory
http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/ Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2009/11/15/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/11/15/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/11/16/1 Mailing List Third Party Advisory
http://www.osvdb.org/59958 Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0142.html Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0149.html Broken Link
http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0153.html Broken Link
http://core.trac.wordpress.org/ticket/11122 Issue Tracking Vendor Advisory
http://secunia.com/advisories/37332 Third Party Advisory
http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/ Patch Vendor Advisory
http://www.openwall.com/lists/oss-security/2009/11/15/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/11/15/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/11/16/1 Mailing List Third Party Advisory
http://www.osvdb.org/59958 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:08

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0142.html - Broken Link () http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0142.html - Broken Link
References () http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0149.html - Broken Link () http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0149.html - Broken Link
References () http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0153.html - Broken Link () http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0153.html - Broken Link
References () http://core.trac.wordpress.org/ticket/11122 - Issue Tracking, Vendor Advisory () http://core.trac.wordpress.org/ticket/11122 - Issue Tracking, Vendor Advisory
References () http://secunia.com/advisories/37332 - Third Party Advisory () http://secunia.com/advisories/37332 - Third Party Advisory
References () http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/ - Patch, Vendor Advisory () http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/ - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2009/11/15/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2009/11/15/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2009/11/15/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2009/11/15/3 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2009/11/16/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2009/11/16/1 - Mailing List, Third Party Advisory
References () http://www.osvdb.org/59958 - Broken Link () http://www.osvdb.org/59958 - Broken Link

Information

Published : 2009-11-17 18:30

Updated : 2024-11-21 01:08


NVD link : CVE-2009-3890

Mitre link : CVE-2009-3890

CVE.ORG link : CVE-2009-3890


JSON object : View

Products Affected

wordpress

  • wordpress
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')