The shopp_upload_file AJAX action of the Shopp WordPress plugin through 1.4, available to both unauthenticated and authenticated user does not have any security measure in place to prevent upload of malicious files, such as PHP, allowing unauthenticated users to upload arbitrary files and leading to RCE
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/dcc7be04-550b-427a-a14f-a2365d96a00e | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/dcc7be04-550b-427a-a14f-a2365d96a00e | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/dcc7be04-550b-427a-a14f-a2365d96a00e - Exploit, Third Party Advisory |
Information
Published : 2021-09-13 18:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24493
Mitre link : CVE-2021-24493
CVE.ORG link : CVE-2021-24493
JSON object : View
Products Affected
ingenesis
- shopp
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type