WordPress version <4.9 contains a CWE-20 Input Validation vulnerability in thumbnail processing that can result in remote code execution. This attack appears to be exploitable via thumbnail upload by an authenticated user and may require additional plugins in order to be exploited however this has not been confirmed at this time. This issue appears to have been partially, but not completely fixed in WordPress 4.9
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105305 | Third Party Advisory VDB Entry |
https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ | Third Party Advisory |
https://youtu.be/GePBmsNJw6Y?t=1763 | Third Party Advisory |
http://www.securityfocus.com/bid/105305 | Third Party Advisory VDB Entry |
https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ | Third Party Advisory |
https://youtu.be/GePBmsNJw6Y?t=1763 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105305 - Third Party Advisory, VDB Entry | |
References | () https://www.theregister.co.uk/2018/08/20/php_unserialisation_wordpress_vuln/ - Third Party Advisory | |
References | () https://youtu.be/GePBmsNJw6Y?t=1763 - Third Party Advisory |
Information
Published : 2018-09-06 12:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000600
Mitre link : CVE-2017-1000600
CVE.ORG link : CVE-2017-1000600
JSON object : View
Products Affected
wordpress
- wordpress
CWE
CWE-20
Improper Input Validation