The WP Live Chat Support Pro plugin before 8.0.07 for WordPress is vulnerable to unauthenticated Remote Code Execution due to client-side validation of allowed file types, as demonstrated by a v1/remote_upload request with a .php filename and the image/jpeg content type.
References
Link | Resource |
---|---|
https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt | Third Party Advisory |
https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9697 | |
https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt | Third Party Advisory |
https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 | Exploit Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9697 |
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/CodeCabin/wp-live-chat-support/blob/master/readme.txt - Third Party Advisory | |
References | () https://github.com/RiieCco/write-ups/tree/master/CVE-2018-12426 - Exploit, Third Party Advisory | |
References | () https://wpvulndb.com/vulnerabilities/9697 - |
Information
Published : 2018-07-02 17:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12426
Mitre link : CVE-2018-12426
CVE.ORG link : CVE-2018-12426
JSON object : View
Products Affected
3cx
- live_chat
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type