Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-8942

Опубликовано: 20 фев. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 6.5
CVSS3: 8.8

Описание

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

5.0.3+dfsg1-1
disco

not-affected

5.0.3+dfsg1-1
eoan

not-affected

5.0.3+dfsg1-1
esm-apps/bionic

needed

esm-apps/focal

not-affected

5.0.3+dfsg1-1
esm-apps/jammy

not-affected

5.0.3+dfsg1-1
esm-apps/noble

not-affected

5.0.3+dfsg1-1
esm-apps/xenial

needed

Показывать по

6.5 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 6 лет назад

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

CVSS3: 8.8
debian
больше 6 лет назад

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code executi ...

CVSS3: 8.8
github
около 3 лет назад

WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.

6.5 Medium

CVSS2

8.8 High

CVSS3