Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5695

Опубликовано: 19 дек. 2008
Источник: debian
EPSS Средний

Описание

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed2.3.2package
wordpressno-dsaetchpackage

Примечания

  • only the admin has manage_options capabilities by default and only editors

  • have upload_files capabilities

  • Only versions prior to 2.3.2 are affected according to the Debian maintainer

EPSS

Процентиль: 95%
0.1726
Средний

Связанные уязвимости

ubuntu
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

nvd
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

github
около 3 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

EPSS

Процентиль: 95%
0.1726
Средний