The Kaswara Modern VC Addons WordPress plugin through 3.0.1 allows unauthenticated arbitrary file upload via the 'uploadFontIcon' AJAX action. The supplied zipfile being unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167743/WordPress-Kaswara-Modern-WPBakery-Page-Builder-3.0.1-File-Upload.html | Exploit Third Party Advisory VDB Entry |
https://codecanyon.net/item/kaswara-modern-visual-composer-addons/19341477 | Product Third Party Advisory |
https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/167743/WordPress-Kaswara-Modern-WPBakery-Page-Builder-3.0.1-File-Upload.html | Exploit Third Party Advisory VDB Entry |
https://codecanyon.net/item/kaswara-modern-visual-composer-addons/19341477 | Product Third Party Advisory |
https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-05-14 12:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24284
Mitre link : CVE-2021-24284
CVE.ORG link : CVE-2021-24284
JSON object : View
Products Affected
kaswara_project
- kaswara
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type