'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

vul_app:wordpress_infusionsoft_gravity_form_plugin_valid_input_vul(Rule ID:1070210015)

Release Date2025/9/15

Rule NameCVE-2014-6446: WordPress Infusionsoft Gravity Forms Plugin Input Validation Vulnerability

Severity:high

CVE IDCVE-2014-6446

 

Descripiton

WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a Web server that is either a part of an Internet hosting service or a network host in its own right. The Infusionsoft Gravity Forms plugin 1.5.3 througth 1.5.10 for WordPress does not properly restrict access, which allows remote attackers to upload arbitrary files and execute arbitrary PHP code via a request to utilties/code_generator.php. This rule supports to defend the A6: Vulnerable and Outdated Components and A1: Broken Access Control of OWASP Top 10 - 2021.
Other reference:None

 

Solution

Update vendor patches.