漏洞信息详情
WordPress ‘Kish Guest Posting’ 插件 ‘uploadify.php’ 任意文件上传漏洞
- CNNVD编号:CNNVD-201202-023
- 危害等级: 中危
- CVE编号:
CVE-2012-1125
- 漏洞类型:
其他
- 发布时间:
1900-01-01
- 威胁类型:
远程
- 更新时间:
2012-02-06
- 厂 商:
kishore_asokan - 漏洞来源:
EgiX -
漏洞简介
WordPress的Kish Guest Posting插件1.2之前版本中的uploadify/scripts/uploadify.php中存在任意文件上传漏洞,该漏洞源于应用程序对用户提供的输入未经充分过滤。攻击者可利用该漏洞上传任意文件到受影响的计算机,这将导致在受影响的应用程序上下文中执行任意代码。
漏洞公告
目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
参考网址
来源: BID
名称: 51638
链接:http://www.securityfocus.com/bid/51638
来源: OSVDB
名称: 78479
来源: MLIST
名称: [oss-security] 20120308 Re: CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution
链接:http://www.openwall.com/lists/oss-security/2012/03/08/1
来源: MLIST
名称: [oss-security] 20120306 CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution
链接:http://www.openwall.com/lists/oss-security/2012/03/06/3
来源: MLIST
名称: [oss-security] 20120306 Re: CVE-request: Kish Guest Posting Plugin for WordPress File Upload Remote PHP Code Execution
链接:http://www.openwall.com/lists/oss-security/2012/03/06/11
来源: EXPLOIT-DB
名称: 18412
链接:http://www.exploit-db.com/exploits/18412
来源: SECUNIA
名称: 47688
链接:http://secunia.com/advisories/47688
来源: plugins.trac.wordpress.org
来源: plugins.svn.wordpress.org
链接:http://plugins.svn.wordpress.org/kish-guest-posting/trunk/readme.txt
来源: BUGTRAQ
名称: 20120123 WordPress Kish Guest Posting Plugin 1.0 (uploadify.php) Unrestricted File Upload Vulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2012-01/0145.html
来源:NSFOCUS
名称:21072
链接:http://www.nsfocus.net/vulndb/21072