Описание
actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote attackers to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.
actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote attackers to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2012-1011
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72640
- http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html
- http://secunia.com/advisories/47659
- http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog
- http://www.exploit-db.com/exploits/18407
- http://www.securityfocus.com/bid/51615
EPSS
CVE ID
Связанные уязвимости
actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote attackers to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.
EPSS