Unrestricted file upload vulnerability in sam-ajax-admin.php in the Simple Ads Manager plugin before 2.5.96 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the directory specified by the path parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/131282/WordPress-Simple-Ads-Manager-2.5.94-File-Upload.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Apr/8 - Exploit | |
References | () http://www.itas.vn/news/ITAS-Team-found-out-multiple-critical-vulnerabilities-in-Hakin9-IT-Security-Magazine-78.html - Exploit | |
References | () https://wordpress.org/plugins/simple-ads-manager/changelog/ - Patch | |
References | () https://www.exploit-db.com/exploits/36614/ - |
Information
Published : 2015-04-21 15:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2825
Mitre link : CVE-2015-2825
CVE.ORG link : CVE-2015-2825
JSON object : View
Products Affected
simple_ads_manager_project
- simple_ads_manager
CWE