Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7ww7-rp6j-6vrg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Lack of authentication or validation in motor_load_more, motor_gallery_load_more, motor_quick_view and motor_project_quick_view AJAX handlers of the Motor WordPress theme before 3.1.0 allows an unauthenticated attacker access to arbitrary files in the server file system, and to execute arbitrary php scripts found on the server file system. We found no vulnerability for uploading files with this theme, so any scripts to be executed must already be on the server file system.

Lack of authentication or validation in motor_load_more, motor_gallery_load_more, motor_quick_view and motor_project_quick_view AJAX handlers of the Motor WordPress theme before 3.1.0 allows an unauthenticated attacker access to arbitrary files in the server file system, and to execute arbitrary php scripts found on the server file system. We found no vulnerability for uploading files with this theme, so any scripts to be executed must already be on the server file system.

EPSS

Процентиль: 86%
0.03013
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

Lack of authentication or validation in motor_load_more, motor_gallery_load_more, motor_quick_view and motor_project_quick_view AJAX handlers of the Motor WordPress theme before 3.1.0 allows an unauthenticated attacker access to arbitrary files in the server file system, and to execute arbitrary php scripts found on the server file system. We found no vulnerability for uploading files with this theme, so any scripts to be executed must already be on the server file system.

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость реализации функций на основе технологии AJAX motor_load_more(), motor_gallery_load_more(), motor_quick_view() и motor_project_quick_view() темы Motor – Cars, Parts, Service, Equipments and Accessories WooCommerce Store системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный PHP-код или получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 86%
0.03013
Низкий

Дефекты

CWE-22