The videowhisper-video-presentation plugin 3.31.17 for WordPress allows remote attackers to execute arbitrary code because vp/vw_upload.php considers a file safe when "html" are the last four characters, as demonstrated by a .phtml file containing PHP code.
References
Link | Resource |
---|---|
http://www.vapidlabs.com/advisory.php?v=117 | Exploit Third Party Advisory |
https://www.openwall.com/lists/oss-security/2015/04/01/2 | Exploit Mailing List Third Party Advisory |
http://www.vapidlabs.com/advisory.php?v=117 | Exploit Third Party Advisory |
https://www.openwall.com/lists/oss-security/2015/04/01/2 | Exploit Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 02:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.vapidlabs.com/advisory.php?v=117 - Exploit, Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2015/04/01/2 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2018-10-05 06:29
Updated : 2024-11-21 02:40
NVD link : CVE-2015-9272
Mitre link : CVE-2015-9272
CVE.ORG link : CVE-2015-9272
JSON object : View
Products Affected
videowhisper
- video_presentation
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')