The Plainview Activity Monitor plugin before 20180826 for WordPress is vulnerable to OS command injection via shell metacharacters in the ip parameter of a wp-admin/admin.php?page=plainview_activity_monitor&tab=activity_tools request.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/45274/ | Exploit Third Party Advisory VDB Entry |
https://github.com/aas-n/CVE/tree/master/CVE-2018-15877 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/155502/WordPress-Plainview-Activity-Monitor-20161228-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/163425/WordPress-Plainview-Activity-Monitor-20161228-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-08-26 00:29
Updated : 2023-02-01 17:03
NVD link : CVE-2018-15877
Mitre link : CVE-2018-15877
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
plainview_activity_monitor_project
- plainview_activity_monitor