vendor:
Plainview Activity Monitor
by:
Beren Kuday GORUN
8,8
CVSS
HIGH
Remote Code Execution (RCE)
20
CWE
Product Name: Plainview Activity Monitor
Affected Version From: 20161228
Affected Version To: 20180826
Patch Exists: YES
Related CWE: CVE-2018-15877
CPE: 2.6:a:plainview_activity_monitor:plainview_activity_monitor:20161228
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/wp_plainview_activity_monitor_rce, https://www.infosecmatter.com/nessus-plugin-library/?id=80195, https://www.infosecmatter.com/nessus-plugin-library/?id=68915, https://www.infosecmatter.com/nessus-plugin-library/?id=71229, https://www.infosecmatter.com/nessus-plugin-library/?id=80119
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2021
WordPress Plugin Plainview Activity Monitor 20161228 – Remote Code Execution (RCE) (Authenticated) (2)
A vulnerability in the WordPress Plugin Plainview Activity Monitor 20161228 could allow an authenticated user to execute arbitrary code on the target system. The vulnerability exists due to improper input validation of the ‘ip’ parameter in the ‘admin.php?page=plainview_activity_monitor&tab=activity_tools’ page. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable system. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
Mitigation:
Update to version 20180826 or later.