The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-06-14 07:15
Updated : 2022-11-08 19:54
NVD link : CVE-2021-24347
Mitre link : CVE-2021-24347
JSON object : View
CWE
CWE-178
Improper Handling of Case Sensitivity
Products Affected
smartypantsplugins
- sp_project_\&_document_manager