CVE-2012-1205

PHP remote file inclusion vulnerability in relocate-upload.php in Relocate Upload plugin before 0.20 for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:alanft:relocate-upload:*:*:*:*:*:*:*:*
cpe:2.3:a:alanft:relocate-upload:0.10:*:*:*:*:*:*:*
cpe:2.3:a:alanft:relocate-upload:0.11:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:36

Type Values Removed Values Added
References () http://osvdb.org/79250 - () http://osvdb.org/79250 -
References () http://plugins.trac.wordpress.org/changeset/504380/relocate-upload - Exploit, Patch () http://plugins.trac.wordpress.org/changeset/504380/relocate-upload - Exploit, Patch
References () http://secunia.com/advisories/47976 - Vendor Advisory () http://secunia.com/advisories/47976 - Vendor Advisory
References () http://wordpress.org/extend/plugins/relocate-upload/changelog/ - Patch () http://wordpress.org/extend/plugins/relocate-upload/changelog/ - Patch
References () http://www.securityfocus.com/bid/49693 - Exploit () http://www.securityfocus.com/bid/49693 - Exploit

Information

Published : 2012-02-24 13:55

Updated : 2024-11-21 01:36


NVD link : CVE-2012-1205

Mitre link : CVE-2012-1205

CVE.ORG link : CVE-2012-1205


JSON object : View

Products Affected

alanft

  • relocate-upload

wordpress

  • wordpress
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')