PHP remote file inclusion vulnerability in relocate-upload.php in Relocate Upload plugin before 0.20 for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.
References
Link | Resource |
---|---|
http://secunia.com/advisories/47976 | Vendor Advisory |
http://wordpress.org/extend/plugins/relocate-upload/changelog/ | Patch |
http://plugins.trac.wordpress.org/changeset/504380/relocate-upload | Exploit Patch |
http://www.securityfocus.com/bid/49693 | Exploit |
http://osvdb.org/79250 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2012-02-24 05:55
Updated : 2012-02-24 05:55
NVD link : CVE-2012-1205
Mitre link : CVE-2012-1205
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
alanft
- relocate-upload
wordpress
- wordpress