CVE-2017-16871

The UpdraftPlus plugin through 1.13.12 for WordPress allows remote PHP code execution because the plupload_action function in /wp-content/plugins/updraftplus/admin.php has a race condition before deleting a file associated with the name parameter. NOTE: the vendor reports that this does not cross a privilege boundary
Configurations

Configuration 1 (hide)

cpe:2.3:a:updraftplus:updraftplus:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 03:17

Type Values Removed Values Added
References () https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated--upload-file-and-php-code-execution - Exploit, Issue Tracking, Third Party Advisory () https://github.com/LoRexxar/CVE_Request/tree/master/wordpress%20plugin%20updraftplus%20vulnerablity#authenticated--upload-file-and-php-code-execution - Exploit, Issue Tracking, Third Party Advisory

07 Nov 2023, 02:40

Type Values Removed Values Added
Summary ** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for WordPress allows remote PHP code execution because the plupload_action function in /wp-content/plugins/updraftplus/admin.php has a race condition before deleting a file associated with the name parameter. NOTE: the vendor reports that this does not cross a privilege boundary. The UpdraftPlus plugin through 1.13.12 for WordPress allows remote PHP code execution because the plupload_action function in /wp-content/plugins/updraftplus/admin.php has a race condition before deleting a file associated with the name parameter. NOTE: the vendor reports that this does not cross a privilege boundary

Information

Published : 2017-11-17 09:29

Updated : 2024-11-21 03:17


NVD link : CVE-2017-16871

Mitre link : CVE-2017-16871

CVE.ORG link : CVE-2017-16871


JSON object : View

Products Affected

updraftplus

  • updraftplus
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')