René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

126 lines
4.4 KiB
JSON

{
"id": "CVE-2018-14028",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-08-10T16:29:00.343",
"lastModified": "2018-10-10T13:06:52.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In WordPress 4.9.7, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins."
},
{
"lang": "es",
"value": "En WordPress 4.9.7, los plugins subidos mediante el \u00e1rea de admin no se verifican como archivos ZIP. Esto permite la subida de archivos PHP. Una vez se sube un archivo PHP, la extracci\u00f3n del plugin falla, pero el archivo PHP se mantiene en una ubicaci\u00f3n wp-content/uploads predecible, lo que permite que un atacante ejecute el archivo. Esto representa un riesgo para la seguridad en escenarios limitados en los que un atacante (que tiene las capacidades requeridas para subir plugins) no puede colocar c\u00f3digo PHP arbitrario en un archivo ZIP de plugin v\u00e1lido, debido a que los permisos del directorio wp-content/plugins de una m\u00e1quina se configuraron para bloquear todos los nuevos plugins."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wordpress:wordpress:4.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0D85409E-5701-4928-A53E-7B3D63E4B561"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/105060",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://core.trac.wordpress.org/ticket/44710",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/rastating/wordpress-exploit-framework/pull/52",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://rastating.github.io/unrestricted-file-upload-via-plugin-uploader-in-wordpress/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}