CVE-2013-1916

In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (executed) even if the photo has not been yet approved.
References
Link Resource
https://plugins.trac.wordpress.org/changeset/347137 Patch Third Party Advisory
https://wordpress.org/plugins/user-photo/#developers Release Notes Third Party Advisory
https://www.exploit-db.com/exploits/16181 Exploit Third Party Advisory VDB Entry
https://plugins.trac.wordpress.org/changeset/347137 Patch Third Party Advisory
https://wordpress.org/plugins/user-photo/#developers Release Notes Third Party Advisory
https://www.exploit-db.com/exploits/16181 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:user_photo_project:user_photo:0.9.4:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/347137 - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset/347137 - Patch, Third Party Advisory
References () https://wordpress.org/plugins/user-photo/#developers - Release Notes, Third Party Advisory () https://wordpress.org/plugins/user-photo/#developers - Release Notes, Third Party Advisory
References () https://www.exploit-db.com/exploits/16181 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/16181 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2022-06-24 15:15

Updated : 2024-11-21 01:50


NVD link : CVE-2013-1916

Mitre link : CVE-2013-1916

CVE.ORG link : CVE-2013-1916


JSON object : View

Products Affected

user_photo_project

  • user_photo
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type