6.8
CVE-2013-7102
- EPSS 63.32%
- Veröffentlicht 23.12.2013 23:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
OptimizePress < 1.6 - Arbitrary File Upload
Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.
Mögliche Gegenmaßnahme
OptimizePress: Update to version 1.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Theme
≫
Produkt
OptimizePress
Version
[*, 1.6)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Optimizepress ≫ Optimizepress Update- Edition- SwEdition- SwPlatformwordpress Version <= 1.60
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 63.32% | 0.984 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.