Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2008-07-30 16:41
Updated : 2024-02-04 17:33
NVD link : CVE-2008-3362
Mitre link : CVE-2008-3362
CVE.ORG link : CVE-2008-3362
JSON object : View
Products Affected
giulio_ganci
- wp_downloads_manager
wordpress
- wp_downloads_manager
CWE
CWE-20
Improper Input Validation