The Social Photo Gallery plugin 1.0 for WordPress allows Remote Code Execution by creating an album and attaching a malicious PHP file in the cover photo album, because the file extension is not checked.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155357/WordPress-Social-Photo-Gallery-1.0-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2019/Nov/13 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/social-photo-gallery/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9952 | Third Party Advisory |
http://packetstormsecurity.com/files/155357/WordPress-Social-Photo-Gallery-1.0-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2019/Nov/13 | Exploit Mailing List Third Party Advisory |
https://wordpress.org/plugins/social-photo-gallery/#developers | Release Notes Third Party Advisory |
https://wpvulndb.com/vulnerabilities/9952 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-11-18 16:15
Updated : 2024-11-21 04:26
NVD link : CVE-2019-14467
Mitre link : CVE-2019-14467
CVE.ORG link : CVE-2019-14467
JSON object : View
Products Affected
infoway
- social_photo_gallery
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type