Show plain JSON{"id": "CVE-2019-8942", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2019-02-20T03:29:00.250", "references": [{"url": "http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/107088", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://wpvulndb.com/vulnerabilities/9222", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.debian.org/security/2019/dsa-4401", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/46511/", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/46662/", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/107088", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://wpvulndb.com/vulnerabilities/9222", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.debian.org/security/2019/dsa-4401", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/46511/", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/46662/", "tags": ["Exploit", "Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-434"}]}], "descriptions": [{"lang": "en", "value": "WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943."}, {"lang": "es", "value": "WordPress, en versiones anteriores a la 4.99 y en las 5.x anteriores a la 5.0.1, permite la ejecuci\u00f3n remota de c\u00f3digo debido a que una entrada \"Post Meta\" _wp_attached_file puede modificarse a una cadena arbitraria, como uno que termina en una subcadena \".jpg?file.php\". Un atacante con privilegios de autor puede ejecutar c\u00f3digo arbitrario subiendo una imagen manipulada que contiene c\u00f3digo PHP en los metadatos Exif. Su explotaci\u00f3n exitosa puede aprovechar el CVE-2019-8943."}], "lastModified": "2024-11-21T04:50:42.360", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEEA870E-2BB4-4720-A3D9-1FFBA5596D94", "versionEndExcluding": "4.9.9"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6388DAB8-F3FA-4200-9F3B-95C313A60D6C"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94A6DBFD-C0C6-4DE4-87C2-172B775D2D79"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28795DB4-793A-45FE-9AC3-8DA0744EC49A"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31C648F2-8168-499C-ABEA-80257CA6602F"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8491A84A-412E-48EA-BB3E-6B8DE391C0B7"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "226A4045-672A-4D89-9A81-695EA1AD2567"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D05F1BB-F066-4D9D-A270-106DABE83E58"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACDBA025-8E1C-4712-AA3A-9061F59517CC"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:5.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFFF7BFC-9D10-4569-965A-9640C722EEBC"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}