vendor:
Simple Ads Manager
by:
Tran Dinh Tien & ITAS Team
8.8
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: Simple Ads Manager
Affected Version From: Simple Ads Manager 2.5.94
Affected Version To: Simple Ads Manager 2.5.94
Patch Exists: YES
Related CWE: CVE-2015-2825
CPE: a:wordpress:simple_ads_manager
Metasploit:
https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6770/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6787/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6765/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6766/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6767/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6768/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6769/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6771/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6772/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6773/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6777/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6782/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6784/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6785/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-6786/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-8478/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=87195, https://www.infosecmatter.com/nessus-plugin-library/?id=87289, https://www.infosecmatter.com/nessus-plugin-library/?id=87206, https://www.infosecmatter.com/nessus-plugin-library/?id=70257, https://www.infosecmatter.com/nessus-plugin-library/?id=69984
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2015
WordPress plugin Simple Ads Manager – Arbitrary File Upload
A vulnerability in the Wordpress plugin Simple Ads Manager allows an attacker to upload arbitrary files to the server. This is due to the lack of proper validation of the uploaded file in the 'sam-ajax-admin.php' file from line 303 to 314. This can be exploited to upload malicious files and execute arbitrary code on the server.
Mitigation:
Update the plugin to the latest version