1 results (0.009 seconds)

CVSS: 9.8EPSS: 1%CPEs: 4EXPL: 3

PHP remote file inclusion vulnerability in relocate-upload.php in Relocate Upload plugin before 0.20 for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter. Una vulnerabilidad de inclusión de archivo PHP remota en relocate-upload.php en el complemento 'Relocate Upload' para Wordpress antes de v0.20 permite a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro abspath. • https://www.exploit-db.com/exploits/17869 http://osvdb.org/79250 http://plugins.trac.wordpress.org/changeset/504380/relocate-upload http://secunia.com/advisories/47976 http://wordpress.org/extend/plugins/relocate-upload/changelog http://www.securityfocus.com/bid/49693 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •