Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-1125

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2012-1125
Last Modified 29 Jan 2013 11:48:05
Published 08 Oct 2012 01:55:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2012-1125

Summary

Unrestricted file upload vulnerability in uploadify/scripts/uploadify.php in the Kish Guest Posting plugin before 1.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the directory specified by the folder parameter.

Vulnerable Systems

Application

  • Kishore Asokan Kish Guest Posting Plugin 1.0

  • Kishore Asokan Kish Guest Posting Plugin 1.1


References

BID - 51638

OSVDB - 78479

MLIST - [oss-security] 20120308 Re: CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution

MLIST - [oss-security] 20120306 CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution

MLIST - [oss-security] 20120306 Re: CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution

EXPLOIT-DB - 18412

SECUNIA - 47688

CONFIRM - http://plugins.trac.wordpress.org/changeset/403694/kish-guest-posting/trunk/uploadify/scripts/uploadify.php

CONFIRM - http://plugins.svn.wordpress.org/kish-guest-posting/trunk/readme.txt

BUGTRAQ - 20120123 Wordpress Kish Guest Posting Plugin 1.0 (uploadify.php) Unrestricted File Upload Vulnerability

XF - wp-kishguest-uploadify-file-upload(79563)


Last Updated: 27 May 2016 11:00:53