Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.112046
Kategorie:Web application abuses
Titel:WordPress NextGEN Gallery Plugin Malicious File Upload Vulnerability
Zusammenfassung:In post-new.php in the NextGEN Gallery plugin for WordPress, unrestricted file upload is available via the name parameter, if a file extension is changed from .jpg to .php.
Beschreibung:Summary:
In post-new.php in the NextGEN Gallery plugin for WordPress, unrestricted file upload is available via the name parameter, if a file extension is changed from .jpg to .php.

Vulnerability Insight:
Even though credentials are required to upload file into the server, any
new combined vulnerability can allow an attacker to Upload shell into the
server which gives entire root access of the server.

Vulnerability Impact:
Successful exploitation of this vulnerability will give the attacker root access to the server.

Affected Software/OS:
WordPress NextGEN Gallery plugin before 2.1.15.

Solution:
Update to version 2.1.15 or later.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-9228
http://www.openwall.com/lists/oss-security/2015/10/27/6
https://cybersecurityworks.com/zerodays/cve-2015-9228-crony.html
https://github.com/cybersecurityworks/Disclosed/issues/6
https://packetstormsecurity.com/files/135061/WordPress-NextGEN-Gallery-2.1.10-Shell-Upload.html
https://wordpress.org/plugins/nextgen-gallery/#developers
https://wpvulndb.com/vulnerabilities/9758
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.