CVE-2012-10064
Lifecycle Timeline
3Description
Omni Secure Files plugin versions prior to 0.1.14 contain an arbitrary file upload vulnerability in the bundled plupload example endpoint. The /wp-content/plugins/omni-secure-files/plupload/examples/upload.php handler allows unauthenticated uploads without enforcing safe file type restrictions, enabling an attacker to place attacker-controlled files under the plugin's uploads directory. This can lead to remote code execution if a server-executable file type is uploaded and subsequently accessed.
Analysis
Omni Secure File versions up to 0.1.14 is affected by unrestricted upload of file with dangerous type.
Technical Context
This vulnerability (CWE-434: Unrestricted Upload of File with Dangerous Type) exists in the bundled plupload example component. Omni Secure Files plugin versions prior to 0.1.14 contain an arbitrary file upload vulnerability in the bundled plupload example endpoint. The /wp-content/plugins/omni-secure-files/plupload/examples/upload.php handler allows unauthenticated uploads without enforcing safe file type restrictions, enabling an attacker to place attacker-controlled files under the plugin's uploads directory. This can lead to remote code execution if a server-executable file type is uploaded and subsequently accessed.
Affected Products
Product: Omni Secure File. Versions: up to 0.1.14. Component: bundled plupload example.
Remediation
Monitor vendor advisories for a patch. Validate file types by content. Store uploads outside web root.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today