Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8mv6-q53q-hqj8

Опубликовано: 06 сент. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.

The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.

EPSS

Процентиль: 100%
0.92062
Критический

9.8 Critical

CVSS3

Дефекты

CWE-73

Связанные уязвимости

CVSS3: 9.8
nvd
больше 2 лет назад

The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость функции Imagick() (~/includes/mla-stream-image.php) плагина Media Library Assistant системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.92062
Критический

9.8 Critical

CVSS3

Дефекты

CWE-73