Summary
This host is running WordPress Asset Manager Plugin and is prone to file upload vulnerability.
Impact
Successful exploitation will allow attacker to upload arbitrary PHP code and run it in the context of the Web server process.
Impact Level: System/Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to the wp-content/plugins/asset-manager/upload.php script allowing to upload files with arbitrary extensions to a folder inside the webroot. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script.
Affected
WordPress Asset Manager Plugin version 0.2
References
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
- Adobe ColdFusion Directory Traversal Vulnerability
- Andy's PHP Knowledgebase 's' Parameter SQL Injection Vulnerability
- Apache Struts2 'URL' & 'Anchor' tags Arbitrary Java Method Execution Vulnerabilities
- Apache Solr XML External Entity(XXE) Vulnerability-02 Jan-14