Vulnerability Details : CVE-2014-5460
Public exploit exists!
Unrestricted file upload vulnerability in the Tribulant Slideshow Gallery plugin before 1.4.7 for WordPress allows remote authenticated users to execute arbitrary code by uploading a PHP file, then accessing it via a direct request to the file in wp-content/uploads/slideshow-gallery/.
Vulnerability category: Input validationExecute code
Products affected by CVE-2014-5460
- cpe:2.3:a:tribulant:tibulant_slideshow_gallery:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.4:*:*:*:*:wordpress:*:*
- cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.5:*:*:*:*:wordpress:*:*
- cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.2:*:*:*:*:wordpress:*:*
- cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.3:*:*:*:*:wordpress:*:*
- cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4:*:*:*:*:wordpress:*:*
- cpe:2.3:a:tribulant:tibulant_slideshow_gallery:1.4.1:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5460
93.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-5460
-
Wordpress SlideShow Gallery Authenticated File Upload
Disclosure Date: 2014-08-28First seen: 2020-04-26exploit/unix/webapp/wp_slideshowgallery_uploadThe Wordpress SlideShow Gallery plugin contains an authenticated file upload vulnerability. An attacker can upload arbitrary files to the upload folder. Since the plugin uses its own file upload mechanism instead of the WordPress API, it's possible to upload
CVSS scores for CVE-2014-5460
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2014-5460
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5460
-
https://wordpress.org/plugins/slideshow-gallery/changelog
Slideshow Gallery – WordPress plugin | WordPress.orgPatch
-
http://packetstormsecurity.com/files/128069/WordPress-Slideshow-Gallery-1.4.6-Shell-Upload.html
WordPress Slideshow Gallery 1.4.6 Shell Upload ≈ Packet StormExploit
-
http://www.securityfocus.com/archive/1/533281/100/0/threaded
SecurityFocus
-
http://www.exploit-db.com/exploits/34514
WordPress Plugin Slideshow Gallery 1.4.6 - Arbitrary File Upload - PHP webapps ExploitExploit
-
http://whitexploit.blogspot.mx/2014/08/wordpress-slideshow-gallery-146-shell.html
Whitexploit Security: WordPress Slideshow Gallery 1.4.6 Shell Upload Vulnerability (CVE-2014-5460)Exploit
-
http://www.exploit-db.com/exploits/34681
WordPress Plugin Slideshow Gallery 1.4.6 - Arbitrary File Upload (Python) - PHP webapps ExploitExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/95676
Slideshow Gallery plugin for WordPress file upload CVE-2014-5460 Vulnerability Report
Jump to