The Event Banner WordPress plugin through 1.3 does not verify the uploaded image file, allowing admin accounts to upload arbitrary files, such as .exe, .php, or others executable, leading to RCE. Due to the lack of CSRF check, the issue can also be used via such vector to achieve the same result, or via a LFI as authorisation checks are missing (but would require WP to be loaded)
References
Link | Resource |
---|---|
https://github.com/jinhuang1102/CVE-ID-Reports/blob/master/Event%20Banner.md | Broken Link |
https://wpscan.com/vulnerability/91e81c6d-f24d-4f87-bc13-746715af8f7c | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-05-05T18:39:43
Updated: 2021-05-05T18:39:43
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24252
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-06T13:15:11.757
Modified: 2022-10-25T19:26:25.357
Link: CVE-2021-24252
JSON object: View
Redhat Information
No data.
CWE