6.8

CVE-2013-7102

Exploit

OptimizePress < 1.6 - Arbitrary File Upload

Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.
Mögliche Gegenmaßnahme
OptimizePress: Update to version 1.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Theme
Produkt OptimizePress
Version [*, 1.6)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OptimizepressOptimizepress Update- Edition- SwEdition- SwPlatformwordpress Version <= 1.60
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 63.32% 0.984
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.