| Vulnerability Name: | CVE-2012-3578 (CCN-76123) | ||||||||
| Assigned: | 2012-05-31 | ||||||||
| Published: | 2012-05-31 | ||||||||
| Updated: | 2017-08-29 | ||||||||
| Summary: | Unrestricted file upload vulnerability in html/Upload.php in the FCChat Widget plugin 2.2.13.1 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with a file with an executable extension followed by a safe extension, then accessing it via a direct request to the file in html/images. | ||||||||
| CVSS v3 Severity: | 4.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:UR)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P/E:H/RL:U/RC:UR)
| ||||||||
| Vulnerability Type: | CWE-264 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2012-3578 Source: CCN Type: Packetstorm Security Website WordPress FCChat Widget 2.x Shell Upload Source: MISC Type: Exploit http://packetstormsecurity.org/files/113323/WordPress-FCChat-Widget-2.x-Shell-Upload.html Source: CCN Type: SA49419 WordPress FCChat Widget Plugin Arbitrary File Upload Vulnerability Source: SECUNIA Type: Vendor Advisory 49419 Source: CCN Type: FCChat Widget Web Site WordPress FCChat Widget « WordPress Plugins Source: MISC Type: Exploit http://www.opensyscom.fr/Actualites/wordpress-plugins-fcchat-widget-shell-upload-vulnerability.html Source: CCN Type: OSVDB ID: 82658 FCChat Widget Plugin for WordPress wp-content/plugins/fcchat/html/Upload.php File Upload PHP Code Execution Source: BID Type: Exploit 53855 Source: CCN Type: BID-53855 WordPress FCChat Widget Plugin 'Upload.php' Arbitrary File Upload Vulnerability Source: XF Type: UNKNOWN wp-fcchatwidget-upload-file-upload(76123) Source: XF Type: UNKNOWN wp-fcchatwidget-upload-file-upload(76123) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||