Vulnerability Name: | CVE-2008-3362 (CCN-43987) | ||||||||
Assigned: | 2008-07-24 | ||||||||
Published: | 2008-07-24 | ||||||||
Updated: | 2017-09-29 | ||||||||
Summary: | Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/. | ||||||||
CVSS v3 Severity: | 4.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 8.5 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
5.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:POC/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2008-3362 Source: CCN Type: Giulio Ganci Web site Wp Downloads Manager Source: SREASON Type: UNKNOWN 4060 Source: CCN Type: OSVDB ID: 48813 Wp Downloads Manager Module for Wordpress upload.php upfile Parameter Arbitrary File Upload/Execution Source: BID Type: Exploit 30365 Source: CCN Type: BID-30365 WordPress Wp Downloads Manager Module 'upload.php' Arbitrary File Upload Vulnerability Source: XF Type: UNKNOWN wpdownloadsmanager-upload-file-upload(43987) Source: XF Type: UNKNOWN wpdownloadsmanager-upload-file-upload(43987) Source: EXPLOIT-DB Type: UNKNOWN 6127 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |