Update CVE-2021-24236.yaml
parent
fdcd773bb0
commit
a560ffae18
|
@ -1,13 +1,14 @@
|
|||
id: CVE-2021-24236
|
||||
|
||||
info:
|
||||
name: WordPress Plugin Imagements 1.2.5 Unauthenticated Arbitrary File Upload
|
||||
name: WordPress Plugin Imagements 1.2.5 - Unauthenticated Arbitrary File Upload
|
||||
author: pussycat0x
|
||||
severity: critical
|
||||
description: |
|
||||
The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type along with a PHP filename and code, leading to RCE.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea
|
||||
- https://wordpress.org/plugins/imagements/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-24236
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24236
|
||||
classification:
|
||||
|
@ -15,7 +16,7 @@ info:
|
|||
cvss-score: 9.8
|
||||
cve-id: CVE-2021-24236
|
||||
cwe-id: CWE-434
|
||||
tags: cve,cve2021,upload,rce,wordpress,wp-plugin,imagements
|
||||
tags: cve,cve2021,upload,rce,wordpress,wp-plugin,imagements,wp,unauth
|
||||
|
||||
variables:
|
||||
php: "{{to_lower('{{randstr}}')}}.php"
|
||||
|
|
Loading…
Reference in New Issue