Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 8th, 2019 📆 | 5189 Views ⚑

0

Ninja Forms Plugin up to 3.0.22 on WordPress upload.php name/tmp_name directory traversal


https://www.ispeech.org

CVSS Meta Temp Score Current Exploit Price (≈)
5.3 $0-$5k

A vulnerability was found in Ninja Forms Plugin up to 3.0.22 on WordPress (Plugin Software). It has been classified as critical. This affects code of the file includes/fields/upload.php. The manipulation of the argument name/tmp_name as part of a Parameter leads to a directory traversal vulnerability. CWE is classifying the issue as CWE-22. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was disclosed 05/07/2019. This vulnerability is uniquely identified as CVE-2019-10869 since 04/04/2019. Technical details are known, but no exploit is available.

Upgrading to version 3.0.23 eliminates this vulnerability.

Name

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Directory traversal (CWE-22)
Local: Yes
Remote: No

Availability: ?
Status: Not defined





Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?

Upgrade: Ninja Forms Plugin 3.0.23

04/04/2019 CVE assigned
05/07/2019 +33 days Advisory disclosed
05/08/2019 +1 days VulDB entry created
05/08/2019 +0 days VulDB last updateCVE: CVE-2019-10869 (?)Created: 05/08/2019 07:27 AM
Complete: ?

See the underground prices here!

https://vuldb.com/?id.134457

Tagged with:



Comments are closed.