The File Gallery plugin before 1.7.9.2 for WordPress does not properly escape strings, which allows remote administrators to execute arbitrary PHP code via a \' (backslash quote) in the setting fields to /wp-admin/options-media.php, related to the create_function function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2014/Apr/305 - Exploit | |
References | () http://wordpress.org/plugins/file-gallery/changelog/ - Patch | |
References | () http://www.securityfocus.com/bid/67120 - | |
References | () http://www.securityfocus.com/bid/67183 - |
Information
Published : 2014-05-06 14:55
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2558
Mitre link : CVE-2014-2558
CVE.ORG link : CVE-2014-2558
JSON object : View
Products Affected
skyphe
- file-gallery
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')