Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.
References
Configurations
History
21 Nov 2024, 02:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html - Exploit | |
References | () http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update - | |
References | () http://seclists.org/fulldisclosure/2013/Dec/127 - | |
References | () http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/ - Exploit |
Information
Published : 2013-12-23 23:55
Updated : 2025-04-11 00:51
NVD link : CVE-2013-7102
Mitre link : CVE-2013-7102
CVE.ORG link : CVE-2013-7102
JSON object : View
Products Affected
optimizepress
- optimizepress
CWE
CWE-20
Improper Input Validation