CVE-2013-7102

Multiple unrestricted file upload vulnerabilities in (1) media-upload.php, (2) media-upload-lncthumb.php, and (3) media-upload-sq_button.php in lib/admin/ in the OptimizePress theme before 1.61 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images_comingsoon, images_lncthumbs, or images_optbuttons in wp-content/uploads/optpress/, as exploited in the wild in November 2013.
Configurations

Configuration 1 (hide)

cpe:2.3:a:optimizepress:optimizepress:*:-:-:*:-:wordpress:*:*

History

21 Nov 2024, 02:00

Type Values Removed Values Added
References () http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html - Exploit () http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html - Exploit
References () http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update - () http://help.optimizepress.com/customer/portal/articles/1381790-important-optimizepress-1-0-security-update -
References () http://seclists.org/fulldisclosure/2013/Dec/127 - () http://seclists.org/fulldisclosure/2013/Dec/127 -
References () http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/ - Exploit () http://www.osirt.com/2013/11/wordpress-optimizepress-hack-file-upload-vulnerability/ - Exploit

Information

Published : 2013-12-23 23:55

Updated : 2025-04-11 00:51


NVD link : CVE-2013-7102

Mitre link : CVE-2013-7102

CVE.ORG link : CVE-2013-7102


JSON object : View

Products Affected

optimizepress

  • optimizepress
CWE
CWE-20

Improper Input Validation