Vulnerability Details : CVE-2017-16949
Potential exploit
An issue was discovered in the AccessKeys AccessPress Anonymous Post Pro plugin through 3.1.9 for WordPress. Improper input sanitization allows the attacker to override the settings for allowed file extensions and upload file size, related to inc/cores/file-uploader.php and file-uploader/file-uploader-class.php. This allows the attacker to upload anything they want to the server, as demonstrated by an action=ap_file_upload_action&allowedExtensions[]=php request to /wp-admin/admin-ajax.php that results in a .php file upload and resultant PHP code execution.
Products affected by CVE-2017-16949
- cpe:2.3:a:accesspressthemes:anonymous_post_pro:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-16949
39.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-16949
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-16949
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-16949
-
https://wpvulndb.com/vulnerabilities/8977
AccessPress Anonymous Post Pro < 3.2.0 - Unauthenticated Arbitrary File UploadExploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/145398/Accesspress-Anonymous-Post-Pro-Unauthenticated-Arbitrary-File-Upload.html
Accesspress Anonymous Post Pro Unauthenticated Arbitrary File Upload ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/43324/
Accesspress Anonymous Post Pro < 3.2.0 - Arbitrary File UploadExploit;Third Party Advisory;VDB Entry
Jump to