diff --git a/cves/2021/CVE-2021-24236.yaml b/cves/2021/CVE-2021-24236.yaml index 8e1c55aaaa..f17883b3a4 100644 --- a/cves/2021/CVE-2021-24236.yaml +++ b/cves/2021/CVE-2021-24236.yaml @@ -1,13 +1,14 @@ id: CVE-2021-24236 info: - name: WordPress Plugin Imagements 1.2.5 Unauthenticated Arbitrary File Upload + name: WordPress Plugin Imagements 1.2.5 - Unauthenticated Arbitrary File Upload author: pussycat0x severity: critical description: | The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type along with a PHP filename and code, leading to RCE. reference: - https://wpscan.com/vulnerability/8f24e74f-60e3-4100-9ab2-ec31b9c9cdea + - https://wordpress.org/plugins/imagements/ - https://nvd.nist.gov/vuln/detail/CVE-2021-24236 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24236 classification: @@ -15,7 +16,7 @@ info: cvss-score: 9.8 cve-id: CVE-2021-24236 cwe-id: CWE-434 - tags: cve,cve2021,upload,rce,wordpress,wp-plugin,imagements + tags: cve,cve2021,upload,rce,wordpress,wp-plugin,imagements,wp,unauth variables: php: "{{to_lower('{{randstr}}')}}.php"