CVE-2023-4634

The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:35

Type Values Removed Values Added
References () https://github.com/Patrowl/CVE-2023-4634/ - Exploit, Third Party Advisory () https://github.com/Patrowl/CVE-2023-4634/ - Exploit, Third Party Advisory
References () https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz - Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz - Third Party Advisory, VDB Entry
References () https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/ - Exploit, Third Party Advisory () https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/ - Exploit, Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4 - Patch () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=cve - Third Party Advisory

07 Nov 2023, 04:22

Type Values Removed Values Added
CWE CWE-73

11 Sep 2023, 13:29

Type Values Removed Values Added
References (MISC) https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz - (MISC) https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz - Third Party Advisory, VDB Entry
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=cve - Third Party Advisory
References (MISC) https://github.com/Patrowl/CVE-2023-4634/ - (MISC) https://github.com/Patrowl/CVE-2023-4634/ - Exploit, Third Party Advisory
References (MISC) https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/ - (MISC) https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/ - Exploit, Third Party Advisory
References (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4 - (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4 - Patch
First Time Davidlingren media Library Assistant
Davidlingren
CPE cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:*

06 Sep 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-06 09:15

Updated : 2024-11-21 08:35


NVD link : CVE-2023-4634

Mitre link : CVE-2023-4634

CVE.ORG link : CVE-2023-4634


JSON object : View

Products Affected

davidlingren

  • media_library_assistant
CWE

No CWE.