vendor:
Dandelion Powerful Elegant Wordpress Theme
by:
TheBlackMonster (Marouane)
7,5
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: Dandelion Powerful Elegant Wordpress Theme
Affected Version From: Web Application
Affected Version To: Web Application
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Mozilla, Chrome, Opera -> Windows & Linux
2014
WordPress Dandelion Themes Arbitry File Upload
An arbitrary file upload vulnerability exists in the Dandelion Themes for Wordpress. An attacker can exploit this vulnerability to upload malicious files to the web server and execute arbitrary code. The vulnerability is due to insufficient validation of the uploaded file type. An attacker can exploit this vulnerability by uploading a malicious file with a double extension such as .php.jpg. This can be done by using the upload-handler.php script in the functions directory.
Mitigation:
Ensure that the application validates the file type of the uploaded file and only allows files with the expected extension.