|
|||
Rule General Information |
---|
Release Date: | 2019-06-27 | |
Rule Name: | WordPress Complete Gallery Manager Plugin Arbitrary File Upload Vulnerability (CVE-2013-5962) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Unrestricted file upload vulnerability in frames/upload-images.php in the Complete Gallery Manager plugin before 3.3.4 rev40279 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/[year]/[month]/. | |
Impact: | An attacker could exploit this vulnerability to have unspecified effect. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | ExploitDB:28377 http://archives.neohapsis.com/archives/bugtraq/2013-09/0090.html http://codecanyon.net/item/complete-gallery-manager-for-wordpress/2418606 http://packetstormsecurity.com/files/123303 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://codecanyon.net/item/complete-gallery-manager-for-wordpress/2418606 |