CVE-2015-5681

Unrestricted file upload vulnerability in upload.php in the Powerplay Gallery plugin 3.3 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in *_uploadfolder/big/.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpslideshow:powerplay_gallery:3.3:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 02:33

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html - Exploit () http://packetstormsecurity.com/files/132671/WordPress-WP-PowerPlayGallery-3.3-File-Upload-SQL-Injection.html - Exploit
References () http://seclists.org/fulldisclosure/2015/Jul/64 - Exploit () http://seclists.org/fulldisclosure/2015/Jul/64 - Exploit
References () http://www.openwall.com/lists/oss-security/2015/07/20/1 - Exploit () http://www.openwall.com/lists/oss-security/2015/07/20/1 - Exploit
References () http://www.openwall.com/lists/oss-security/2015/07/27/8 - Exploit () http://www.openwall.com/lists/oss-security/2015/07/27/8 - Exploit
References () http://www.vapid.dhs.org/advisory.php?v=132 - Exploit () http://www.vapid.dhs.org/advisory.php?v=132 - Exploit

Information

Published : 2015-08-18 15:59

Updated : 2024-11-21 02:33


NVD link : CVE-2015-5681

Mitre link : CVE-2015-5681

CVE.ORG link : CVE-2015-5681


JSON object : View

Products Affected

wpslideshow

  • powerplay_gallery