logo

CVE-2014-8739 blueimp/jquery-file-upload

Package

Manager: composer
Name: blueimp/jquery-file-upload
Vulnerable Version: =6.4.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.78939 pctl0.99027

Details

jQuery File Upload Plugin Unrestricted file upload vulnerability Unrestricted file upload vulnerability in `server/php/UploadHandler.php` in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in `files/`, as exploited in the wild in October 2014.

Metadata

Created: 2022-05-17T19:57:26Z
Modified: 2024-04-25T20:34:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wxg6-f773-g2f7/GHSA-wxg6-f773-g2f7.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-wxg6-f773-g2f7
Finding: F027
Auto approve: 1