Unrestricted file upload vulnerability in inc/amfphp/administration/banneruploaderscript.php in the WP EasyCart (aka WordPress Shopping Cart) plugin before 3.0.9 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in products/banners/.
References
Configurations
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/116806 - | |
References | () http://packetstormsecurity.com/files/129875/WordPress-Shopping-Cart-3.0.4-Unrestricted-File-Upload.html - Exploit | |
References | () http://security.szurek.pl/wordpress-shopping-cart-304-unrestricted-file-upload.html - Exploit | |
References | () http://www.exploit-db.com/exploits/35730 - Exploit | |
References | () http://www.securityfocus.com/bid/71983 - | |
References | () https://wordpress.org/plugins/wp-easycart/changelog/ - Patch |
Information
Published : 2015-01-15 15:59
Updated : 2024-11-21 02:20
NVD link : CVE-2014-9308
Mitre link : CVE-2014-9308
CVE.ORG link : CVE-2014-9308
JSON object : View
Products Affected
wpeasycart
- wp_easycart
CWE