Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3890

Опубликовано: 17 нояб. 2009
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 6

Описание

Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.8.6-1ubuntu1
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

not-affected

2.8.6-1ubuntu1
maverick

not-affected

2.8.6-1ubuntu1
natty

not-affected

2.8.6-1ubuntu1
oneiric

not-affected

2.8.6-1ubuntu1

Показывать по

Ссылки на источники

EPSS

Процентиль: 94%
0.12697
Средний

6 Medium

CVSS2

Связанные уязвимости

nvd
больше 15 лет назад

Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.

debian
больше 15 лет назад

Unrestricted file upload vulnerability in the wp_check_filetype functi ...

github
больше 3 лет назад

Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.

EPSS

Процентиль: 94%
0.12697
Средний

6 Medium

CVSS2