Описание
wp-admin/admin-ajax.php?action=newsletters_exportmultiple in the Tribulant Newsletters plugin before 4.6.19 for WordPress allows directory traversal with resultant remote PHP code execution via the subscribers[1][1] parameter in conjunction with an exportfile=../ value.
Ссылки
- Release Notes
- Third Party Advisory
- ExploitThird Party Advisory
- Release Notes
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.6.19 (исключая)
cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 81%
0.01612
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
wp-admin/admin-ajax.php?action=newsletters_exportmultiple in the Tribulant Newsletters plugin before 4.6.19 for WordPress allows directory traversal with resultant remote PHP code execution via the subscribers[1][1] parameter in conjunction with an exportfile=../ value.
EPSS
Процентиль: 81%
0.01612
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-22