CVE-2014-8739
Creative Contact Form < 1.0.0 - Arbitrary File Upload
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.
Una vulnerabilidad de carga de archivos sin restricciones en el archivo server/php/UploadHandler.php en el jQuery File Upload Plugin versión 6.4.4 para jQuery, como es usado en el Creative Solutions Creative Contact Form (anteriormente Sexy Contact Form) versiones anteriores a 1.0.0 para WordPress, y versiones anteriores a 2.0.1 para Joomla!, permite a atacantes remotos ejecutar código arbitrario mediante la carga de un archivo PHP con una extensión PHP, y luego acceder a él mediante una petición directa al archivo en files/, como se explotó "in the wild" en octubre de 2014.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-10-23 CVE Published
- 2014-11-13 CVE Reserved
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2024-11-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://osvdb.org/show/osvdb/113669 | Broken Link | |
http://osvdb.org/show/osvdb/113673 | Broken Link | |
http://www.openwall.com/lists/oss-security/2014/11/11/4 | Mailing List | |
http://www.openwall.com/lists/oss-security/2014/11/11/5 | Mailing List | |
http://www.openwall.com/lists/oss-security/2014/11/13/3 | Mailing List | |
https://wordpress.org/plugins/sexy-contact-form/changelog | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/36811 | 2024-08-06 | |
https://www.exploit-db.com/exploits/35057 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Creative-solutions Search vendor "Creative-solutions" | Creative Contact Form Search vendor "Creative-solutions" for product "Creative Contact Form" | < 1.0.0 Search vendor "Creative-solutions" for product "Creative Contact Form" and version " < 1.0.0" | wordpress |
Affected
| ||||||
Creative-solutions Search vendor "Creative-solutions" | Creative Contact Form Search vendor "Creative-solutions" for product "Creative Contact Form" | < 2.0.1 Search vendor "Creative-solutions" for product "Creative Contact Form" and version " < 2.0.1" | joomla\! |
Affected
| ||||||
Jquery File Upload Project Search vendor "Jquery File Upload Project" | Jquery File Upload Search vendor "Jquery File Upload Project" for product "Jquery File Upload" | 6.4.4 Search vendor "Jquery File Upload Project" for product "Jquery File Upload" and version "6.4.4" | - |
Affected
|