WordPress ‘Kish Guest Posting’ 插件 ‘uploadify.php’ 任意文件上传漏洞

漏洞信息详情

WordPress ‘Kish Guest Posting’ 插件 ‘uploadify.php’ 任意文件上传漏洞

漏洞简介

WordPress的Kish Guest Posting插件1.2之前版本中的uploadify/scripts/uploadify.php中存在任意文件上传漏洞,该漏洞源于应用程序对用户提供的输入未经充分过滤。攻击者可利用该漏洞上传任意文件到受影响的计算机,这将导致在受影响的应用程序上下文中执行任意代码。

漏洞公告

目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://wordpress.org/extend/plugins/email-newsletter/

参考网址

来源: BID

名称: 51638

链接:http://www.securityfocus.com/bid/51638

来源: OSVDB

名称: 78479

链接:http://www.osvdb.org/78479

来源: MLIST

名称: [oss-security] 20120308 Re: CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution

链接:http://www.openwall.com/lists/oss-security/2012/03/08/1

来源: MLIST

名称: [oss-security] 20120306 CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution

链接:http://www.openwall.com/lists/oss-security/2012/03/06/3

来源: MLIST

名称: [oss-security] 20120306 Re: CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution

链接:http://www.openwall.com/lists/oss-security/2012/03/06/11

来源: EXPLOIT-DB

名称: 18412

链接:http://www.exploit-db.com/exploits/18412

来源: SECUNIA

名称: 47688

链接:http://secunia.com/advisories/47688

来源: plugins.trac.wordpress.org

链接:http://plugins.trac.wordpress.org/changeset/403694/kish-guest-posting/trunk/uploadify/scripts/uploadify.php

来源: plugins.svn.wordpress.org

链接:http://plugins.svn.wordpress.org/kish-guest-posting/trunk/readme.txt

来源: BUGTRAQ

名称: 20120123 WordPress Kish Guest Posting Plugin 1.0 (uploadify.php) Unrestricted File Upload Vulnerability

链接:http://archives.neohapsis.com/archives/bugtraq/2012-01/0145.html

来源:NSFOCUS
名称:21072
链接:http://www.nsfocus.net/vulndb/21072

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享