Csv2WPeC Coupon <= 1.1 - Unauthenticated Remote File UploadSign up to our free email alerts service for instant vulnerability notifications!
The code in csv2wpecCoupon_FileUpload.php does not properly sanitize user input, it checks the file mime-type for type x-php but this can be tricked when using the short code for <?php as <? and a file extension of .pht. This allows a malicious user to upload executable files to a vulnerable WordPress installation.
|Proof of Concept||
|OWASP Top 10||A1: Injection|
|Submitter||Larry W. Cashdollar|
|Publicly Published||2015-09-14 (about 2 years ago)|
|Added||2015-09-16 (about 2 years ago)|
|Last Updated||2015-09-16 (about 2 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|