Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2008-07-30 09:41
Updated : 2017-09-28 18:31
NVD link : CVE-2008-3362
Mitre link : CVE-2008-3362
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
giulio_ganci
- wp_downloads_manager
wordpress
- wp_downloads_manager