7.5
CVSSv2

CVE-2014-6446

Published: 26/09/2014 Updated: 01/10/2015
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Infusionsoft Gravity Forms plugin 1.5.3 up to and including 1.5.10 for WordPress does not properly restrict access, which allows remote malicious users to upload arbitrary files and execute arbitrary PHP code via a request to utilities/code_generator.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

infusionsoft gravity forms project infusionsoft gravity forms 1.5.10

infusionsoft gravity forms project infusionsoft gravity forms 1.5.3

infusionsoft gravity forms project infusionsoft gravity forms 1.5.4

infusionsoft gravity forms project infusionsoft gravity forms 1.5.9.4

infusionsoft gravity forms project infusionsoft gravity forms 1.5.9.5

infusionsoft gravity forms project infusionsoft gravity forms 1.5.4.2

infusionsoft gravity forms project infusionsoft gravity forms 1.5.6

infusionsoft gravity forms project infusionsoft gravity forms 1.5.7

infusionsoft gravity forms project infusionsoft gravity forms 1.5.7.1

infusionsoft gravity forms project infusionsoft gravity forms 1.5.7.2

infusionsoft gravity forms project infusionsoft gravity forms 1.5.8

infusionsoft gravity forms project infusionsoft gravity forms 1.5.8.1

infusionsoft gravity forms project infusionsoft gravity forms 1.5.9.1

infusionsoft gravity forms project infusionsoft gravity forms 1.5.9.3

infusionsoft gravity forms project infusionsoft gravity forms 1.5.4.1

infusionsoft gravity forms project infusionsoft gravity forms 1.5.5

infusionsoft gravity forms project infusionsoft gravity forms 1.5.9

infusionsoft gravity forms project infusionsoft gravity forms 1.5.9.2

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::HTTP::Wordpress include Msf::Exploit::FileDropper def initialize(info = {}) super(update_info(info ...