Update CVE-2021-24236.yaml

patch-1
Prince Chaddha 2022-07-31 10:05:00 +05:30 committed by GitHub
parent fdcd773bb0
commit a560ffae18
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 3 additions and 2 deletions

View File

@ -1,13 +1,14 @@
id: CVE-2021-24236
info:
name: WordPress Plugin Imagements 1.2.5 Unauthenticated Arbitrary File Upload
name: WordPress Plugin Imagements 1.2.5 - Unauthenticated Arbitrary File Upload
author: pussycat0x
severity: critical
description: |
The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type along with a PHP filename and code, leading to RCE.
reference:
- https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea
- https://wordpress.org/plugins/imagements/
- https://nvd.nist.gov/vuln/detail/CVE-2021-24236
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24236
classification:
@ -15,7 +16,7 @@ info:
cvss-score: 9.8
cve-id: CVE-2021-24236
cwe-id: CWE-434
tags: cve,cve2021,upload,rce,wordpress,wp-plugin,imagements
tags: cve,cve2021,upload,rce,wordpress,wp-plugin,imagements,wp,unauth
variables:
php: "{{to_lower('{{randstr}}')}}.php"