NA

CVE-2023-4634

Published: 06/09/2023 Updated: 07/11/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated malicious users to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

davidlingren media library assistant

Vendor Advisories

Check Point Reference: CPAI-2023-1158 Date Published: 24 Jan 2024 Severity: Critical ...

Github Repositories

ProjetCL Tuto CVE-2023-4634 Cloner le dépôt Git Pour commencer, clonez le dépôt Git à l'aide de la commande suivante : git clone githubcom/lehazare/ProjetCLgit Construction et exécution du conteneur WordPress Pour exécuter le conteneur WordPress, utilisez la commande suivante :

CVE-2023-4634

CVE-2023-4634 RCE Exploit for Wordpress Plugin Media-Library Plugin < 310 (CVE-2023-4634) Info Patrowl discovered An unauthenticated RCE Vulnerability on Media-Librairy-Assistant Wordpress Plugin in version < 310 The exploit is not trivial and requires just a little setup explained bellow Global discover and exploitaiton of the exploit could be found in our bl