The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/93edcc23-894a-46c2-84d2-407dcb64ba1e | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2021-06-21T19:18:22
Updated: 2021-06-21T19:18:22
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24376
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-21T20:15:09.050
Modified: 2021-09-20T17:10:42.047
Link: CVE-2021-24376
JSON object: View
Redhat Information
No data.
CWE