cve/2021/CVE-2021-42362.md

23 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-42362](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42362)
![](https://img.shields.io/static/v1?label=Product&message=WordPress%20Popular%20Posts&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.
### POC
#### Reference
- http://packetstormsecurity.com/files/165376/WordPress-Popular-Posts-5.3.2-Remote-Code-Execution.html
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2024-05-25 21:48:12 +02:00
- https://github.com/ARPSyndicate/cvemon
2025-09-29 21:09:30 +02:00
- https://github.com/Farrhouq/Inpt-report
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/samiba6/CVE-2021-42362
2024-05-25 21:48:12 +02:00
- https://github.com/simonecris/CVE-2021-42362-PoC