Published on May 8th, 2019 📆 | 5189 Views ⚑
0Ninja Forms Plugin up to 3.0.22 on WordPress upload.php name/tmp_name directory traversal
CVSS Meta Temp Score | Current Exploit Price (≈) |
---|---|
5.3 | $0-$5k |
A vulnerability was found in Ninja Forms Plugin up to 3.0.22 on WordPress (Plugin Software). It has been classified as critical. This affects code of the file includes/fields/upload.php. The manipulation of the argument name/tmp_name
as part of a Parameter leads to a directory traversal vulnerability. CWE is classifying the issue as CWE-22. This is going to have an impact on confidentiality, integrity, and availability.
The weakness was disclosed 05/07/2019. This vulnerability is uniquely identified as CVE-2019-10869 since 04/04/2019. Technical details are known, but no exploit is available.
Upgrading to version 3.0.23 eliminates this vulnerability.
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3
VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: ?
VulDB Reliability: ?
VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Directory traversal (CWE-22)
Local: Yes
Remote: No
Availability: ?
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?
Upgrade: Ninja Forms Plugin 3.0.23
04/04/2019 CVE assigned
05/07/2019 Advisory disclosed
05/08/2019 VulDB entry created
05/08/2019 VulDB last updateCVE: CVE-2019-10869 (?)Created: 05/08/2019 07:27 AM
Complete: ?
See the underground prices here!
https://vuldb.com/?id.134457
Gloss