Описание
The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.57 (исключая)
cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 81%
0.01515
Низкий
7.5 High
CVSS3
6 Medium
CVSS2
Дефекты
CWE-98
CWE-20
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).
EPSS
Процентиль: 81%
0.01515
Низкий
7.5 High
CVSS3
6 Medium
CVSS2
Дефекты
CWE-98
CWE-20