Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-5695

Опубликовано: 19 дек. 2008
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 8.5

Описание

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.5.1-11ubuntu1
gutsy

ignored

end of life, was needs-triage
hardy

not-affected

2.3.3-1ubuntu1
intrepid

not-affected

2.5.1-8ubuntu1
jaunty

not-affected

2.5.1-11ubuntu1
karmic

not-affected

2.5.1-11ubuntu1
upstream

released

1.3.2 and 2.3.3

Показывать по

EPSS

Процентиль: 95%
0.1726
Средний

8.5 High

CVSS2

Связанные уязвимости

nvd
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

debian
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 ...

github
около 3 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

EPSS

Процентиль: 95%
0.1726
Средний

8.5 High

CVSS2