CVE-2008-3362
CVSS V2 High 10
CVSS V3 None
Description
Unrestricted file upload vulnerability in upload.php in the Giulio Ganci Wp Downloads Manager module 0.2 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension via the upfile parameter, then accessing it via a direct request to the file in wp-content/plugins/downloads-manager/upload/.
Overview
- CVE ID
- CVE-2008-3362
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2008-07-30T16:41:00
- Last Modified Date
- 2017-09-29T01:31:38
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:giulio_ganci:wp_downloads_manager:0.2:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:wordpress:wp_downloads_manager:0.2:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 10
- Severity
- HIGH
- Exploitability Score
- 10
- Impact Score
- 10
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2008-3362 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3362 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 08:23:59 | Added to TrackCVE |