CVE-2018-16634
https://notcve.org/view.php?id=CVE-2018-16634
Pluck v4.7.7 allows CSRF via admin.php?action=settings. Pluck v4.7.7 permite Cross-Site Request Forgery (CSRF) mediante admin.php?action=settings. • https://github.com/security-breachlock/CVE-2018-16634/blob/master/PLUCK_CSRF.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2018-16633
https://notcve.org/view.php?id=CVE-2018-16633
Pluck v4.7.7 allows XSS via the admin.php?action=editpage&page= page title. Pluck v4.7.7 permite Cross-Site Scripting (XSS) mediante el título de la página en admin.php?action=editpagepage=. • https://github.com/security-breachlock/CVE-2018-16633/blob/master/PLUCK_XSS.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-16729
https://notcve.org/view.php?id=CVE-2018-16729
Pluck 4.7.7 allows XSS via an SVG file that contains Javascript in a SCRIPT element, and is uploaded via pages->manage under admin.php?action=files. Pluck 4.7.7 permite Cross-Site Scripting (XSS) mediante un archivo SVG que contiene Javascript en un elemento SCRIPT y se sube mediante pages->manage en admin.php?action=files. • https://github.com/pluck-cms/pluck/issues/63 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-11736
https://notcve.org/view.php?id=CVE-2018-11736
An issue was discovered in Pluck before 4.7.7-dev2. /data/inc/images.php allows remote attackers to upload and execute arbitrary PHP code by using the image/jpeg content type for a .htaccess file. Se ha descubierto un problema en Pluck en versiones anteriores a la 4.7.7-dev2. /data/inc/images.php permite que los atacantes remotos suban y ejecutan código PHP arbitrario utilizando el tipo de contenido image/jpeg para un archivo .htaccess. • https://github.com/pluck-cms/pluck/issues/61 https://github.com/pluck-cms/pluck/releases/tag/4.7.7-dev2 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2018-11331
https://notcve.org/view.php?id=CVE-2018-11331
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess. Se ha descubierto un problema en versiones anteriores a la 4.7.6 de Pluck. Es posible la ejecución remota de código PHP debido a que el conjunto de tipos de archivo no permitidos para la subida carece de algunos tipos aplicables, como .phtml y .htaccess. • https://github.com/pluck-cms/pluck/commit/8f6541e60c9435e82e9c531a20cb3c218d36976e https://github.com/pluck-cms/pluck/issues/58 • CWE-434: Unrestricted Upload of File with Dangerous Type •