Unrestricted file upload vulnerability in the Gravity Upload Ajax plugin 1.1 and earlier for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file under wp-content/uploads/gravity_forms.
                
            References
                    | Link | Resource | 
|---|---|
| https://g0blin.co.uk/cve-2014-4972/ | Exploit Third Party Advisory | 
| https://wpvulndb.com/vulnerabilities/8232 | Third Party Advisory | 
| https://g0blin.co.uk/cve-2014-4972/ | Exploit Third Party Advisory | 
| https://wpvulndb.com/vulnerabilities/8232 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://g0blin.co.uk/cve-2014-4972/ - Exploit, Third Party Advisory | |
| References | () https://wpvulndb.com/vulnerabilities/8232 - Third Party Advisory | 
Information
                Published : 2018-01-08 19:29
Updated : 2024-11-21 02:11
NVD link : CVE-2014-4972
Mitre link : CVE-2014-4972
CVE.ORG link : CVE-2014-4972
JSON object : View
Products Affected
                ajax_upload_for_gravity_forms_project
- ajax_upload_for_gravity_forms
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
