| Vulnerability Name: | CVE-2018-14028 (CCN-148248) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-08-03 | ||||||||||||||||||||||||||||||||||||
| Published: | 2018-08-03 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2018-10-10 | ||||||||||||||||||||||||||||||||||||
| Summary: | In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-434 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-14028 Source: BID Type: Third Party Advisory, VDB Entry 105060 Source: CCN Type: BID-105060 WordPress CVE-2018-14028 Arbitrary File Upload Vulnerability Source: CCN Type: WordPress Web site Upload plugin and theme functionalities are not removing uploaded files after failure conditions. Source: MISC Type: Third Party Advisory https://core.trac.wordpress.org/ticket/44710 Source: XF Type: UNKNOWN wp-core-cve201814028-file-upload(148248) Source: MISC Type: Third Party Advisory https://github.com/rastating/wordpress-exploit-framework/pull/52 Source: MISC Type: Third Party Advisory https://rastating.github.io/unrestricted-file-upload-via-plugin-uploader-in-wordpress/ | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||