7.5
CVSSv2

CVE-2012-1011

Published: 07/02/2012 Updated: 29/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote malicious users to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.

Vulnerable Product Search on Vulmon Subscribe to Product

likno allwebmenus_plugin 1.1.8

Exploits

#Exploit Title: AllWebMenus WordPress Menu Plugin Arbitrary file upload #Version: < 119 #Date: 2012-01-19 #Author: 6Scan (6scancom) security team #Software Link: wordpressorg/extend/plugins/allwebmenus-wordpress-menu-plugin/ #Official fix: This advisory is released after the vendor was contacted and fixed the issue promptly # ...