Логотип exploitDog
bind:CVE-2021-24376
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-24376

Количество 3

Количество 3

nvd логотип

CVE-2021-24376

больше 4 лет назад

The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-8637-ph22-g43w

больше 3 лет назад

The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.

EPSS: Средний
fstec логотип

BDU:2021-03240

больше 4 лет назад

Уязвимость функции Import Settings плагина Autoptimize, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-24376

The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.

CVSS3: 9.8
10%
Средний
больше 4 лет назад
github логотип
GHSA-8637-ph22-g43w

The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.

10%
Средний
больше 3 лет назад
fstec логотип
BDU:2021-03240

Уязвимость функции Import Settings плагина Autoptimize, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
10%
Средний
больше 4 лет назад

Уязвимостей на страницу