Vulnerability Details : CVE-2014-8949
The iMember360 plugin 3.8.012 through 3.9.001 for WordPress allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the i4w_trace parameter. NOTE: this can be leveraged with CVE-2014-8948 to allow remote attackers to execute code. NOTE: it is not clear whether this issue itself crosses privileges.
Vulnerability category: Execute code
Products affected by CVE-2014-8949
- cpe:2.3:a:imember360:imember360:3.9.001:*:*:*:*:wordpress:*:*
- cpe:2.3:a:imember360:imember360:3.9.000:*:*:*:*:wordpress:*:*
- cpe:2.3:a:imember360:imember360:3.8.013:*:*:*:*:wordpress:*:*
- cpe:2.3:a:imember360:imember360:3.8.014:*:*:*:*:wordpress:*:*
- cpe:2.3:a:imember360:imember360:3.8.012:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-8949
3.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-8949
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST |
CWE ids for CVE-2014-8949
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8949
-
http://www.exploit-db.com/exploits/33076
WordPress Plugin iMember360 3.8.012 < 3.9.001 - Multiple Vulnerabilities - PHP webapps ExploitExploit
-
http://packetstormsecurity.com/files/126324/WordPress-iMember360is-3.9.001-XSS-Disclosure-Code-Execution.html
WordPress iMember360is 3.9.001 XSS / Disclosure / Code Execution ≈ Packet StormExploit
-
http://seclists.org/fulldisclosure/2014/Apr/265
Full Disclosure: Multiple Vulnerabilities in iMember360 (Wordpress plugin)Exploit
Jump to