Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-1011

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2012-1011
Last Modified 08 Feb 2012 10:06:33
Published 07 Feb 2012 04:55:04
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2012-1011

Summary

actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote attackers to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.

Vulnerable Systems

Application

  • Likno Allwebmenus Plugin 1.1.8


References

XF - allwebmenus-actions-file-upload(72640)

BID - 51615

EXPLOIT-DB - 18407

CONFIRM - http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/

SECUNIA - 47659

BUGTRAQ - 20120122 AllWebMenus < 1.1.9 WordPress Menu Plugin Arbitrary file upload


Last Updated: 27 May 2016 10:57:24