Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-25094

Опубликовано: 25 апр. 2022
Источник: nvd
CVSS3: 8.1
CVSS2: 6.8
EPSS Критический

Описание

The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used without prior authentication to upload a rogue zip file which is uncompressed under the WordPress's upload directory. By adding a PHP shell with a filename starting with a dot ".", this can bypass extension control implemented in the plugin. Moreover, there is a race condition in the zip extraction process which makes the shell file live long enough on the filesystem to be callable by an attacker.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:brandexponents:tatsu:*:*:*:*:*:wordpress:*:*
Версия до 3.3.12 (исключая)

EPSS

Процентиль: 100%
0.90199
Критический

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-306
CWE-306

Связанные уязвимости

CVSS3: 8.1
github
почти 4 года назад

The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used without prior authentication to upload a rogue zip file which is uncompressed under the WordPress's upload directory. By adding a PHP shell with a filename starting with a dot ".", this can bypass extension control implemented in the plugin. Moreover, there is a race condition in the zip extraction process which makes the shell file live long enough on the filesystem to be callable by an attacker.

CVSS3: 8.1
fstec
около 5 лет назад

Уязвимость функции add_custom_font плагина редактирования шаблонов веб-сайтов Tatsu Builder системы управления содержимым сайта WordPress, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.90199
Критический

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-306
CWE-306