[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-6567Date: (C)2017-04-15   (M)2023-12-22


Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access to upload functionality.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.8CVSS Score : 6.5
Exploit Score: 2.8Exploit Score: 8.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: SINGLE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
EXPLOIT-DB-38000
EXPLOIT-DB-40004
http://www.websecgeeks.com/2015/08/wolf-cms-arbitrary-file-upload-to.html
https://github.com/wolfcms/wolfcms/commit/2160275b60736f706dfda132c7c46728c5b255fa
https://github.com/wolfcms/wolfcms/issues/625
https://github.com/wolfcms/wolfcms/releases/tag/0.8.3.1
https://www.wolfcms.org/blog/2015/08/10/releasing-wolf-cms-0-8-3-1.html

CWE    1
CWE-20

© SecPod Technologies